First published: Mon Apr 28 2025(Updated: )
A vulnerability classified as critical was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). Affected by this vulnerability is the function cgidhcpsCfgSet of the file /goform/modules of the component httpd. The manipulation of the argument json leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda W12 | >=3.0.0.4(2887)<=3.0.0.5(3644) | |
Tenda i24 | >=3.0.0.4(2887)<=3.0.0.5(3644) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4007 is classified as a critical vulnerability.
CVE-2025-4007 affects Tenda W12 and Tenda i24 devices running version 3.0.0.4(2887) to 3.0.0.5(3644).
To mitigate CVE-2025-4007, update your Tenda W12 or i24 device to the latest firmware version provided by Tenda.
Exploiting CVE-2025-4007 may result in stack-based buffer overflow, potentially allowing an attacker to execute arbitrary code.
Yes, CVE-2025-4007 is a publicly known vulnerability listed in the National Vulnerability Database.