First published: Sat Apr 19 2025(Updated: )
A vulnerability was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). It has been rated as critical. This issue affects the function cgiSysScheduleRebootSet of the file /bin/httpd. The manipulation of the argument rebootDate leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda W12 | >=3.0.0.4(2887)<=3.0.0.5(3644) | |
Tenda i24 | >=3.0.0.4(2887)<=3.0.0.5(3644) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3803 has been rated as critical due to the potential for a stack-based buffer overflow.
To remediate CVE-2025-3803, users should update their Tenda W12 or i24 devices to the latest available firmware version.
CVE-2025-3803 affects the Tenda W12 and i24 models running firmware versions between 3.0.0.4(2887) and 3.0.0.5(3644).
CVE-2025-3803 can be exploited through manipulation of the rebootDate argument in the cgiSysScheduleRebootSet function.
The exploitation of CVE-2025-3803 could allow an attacker to gain unauthorized access or control over the affected devices.