First published: Tue May 06 2025(Updated: )
In Tenda RX3 V1.0br_V16.03.13.11 in the GetParentControlInfo function of the web url /goform/GetParentControlInfo, the manipulation of the parameter mac leads to stack overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Rx3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-44900 is classified as a critical vulnerability due to its potential to cause stack overflow and compromise device stability.
To address CVE-2025-44900, users should update their Tenda RX3 device firmware to the latest version provided by the vendor.
CVE-2025-44900 can lead to a stack overflow, allowing attackers to potentially execute arbitrary code on the affected Tenda RX3 devices.
Yes, CVE-2025-44900 can be exploited remotely by manipulating the mac parameter in the GetParentControlInfo function of the web interface.
All users running affected firmware versions of the Tenda RX3 device are susceptible to CVE-2025-44900.