First published: Sat Apr 19 2025(Updated: )
A vulnerability was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644) and classified as critical. Affected by this issue is the function cgiSysUplinkCheckSet of the file /bin/httpd. The manipulation of the argument hostIp1/hostIp2 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda W12 | >=3.0.0.4(2887)<=3.0.0.5(3644) | |
Tenda i24 | >=3.0.0.4(2887)<=3.0.0.5(3644) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3820 is classified as a critical vulnerability due to its potential to exploit a stack-based buffer overflow.
CVE-2025-3820 affects Tenda W12 and Tenda i24 routers running firmware versions 3.0.0.4(2887) to 3.0.0.5(3644).
Mitigation for CVE-2025-3820 involves updating the affected Tenda devices to a patched firmware version that resolves the buffer overflow issue.
CVE-2025-3820 can lead to remote code execution through a stack-based buffer overflow attack.
The potential impacts of CVE-2025-3820 include unauthorized access, data breaches, and complete compromise of the affected Tenda router.