Cyber Posture

CVE-2025-28220

High

Published: 28 March 2025

Published
28 March 2025
Modified
06 May 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0060 69.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2025-28220 is a buffer overflow vulnerability (CWE-120) affecting the Tenda W6_S router firmware version 1.0.0.4_510, specifically in the setcfm function. Remote attackers can trigger this flaw by sending a POST request to the binary with a specially crafted value in the funcpara1 parameter, leading to a web server crash. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its high severity due to the potential for denial-of-service.

Any unauthenticated remote attacker with network access to the device can exploit this vulnerability with low complexity and no user interaction required. Exploitation involves crafting and transmitting the malicious POST request, resulting in the web server's crash and disruption of services, though no confidentiality or integrity impacts are possible.

A technical analysis of the vulnerability is documented in the reference at https://github.com/IdaJea/IOT_vuln_1/blob/master/w6_s_v1.0.0.4/setcfm.pdf, published on 2025-03-28. No patch or mitigation details are specified in the CVE description.

Details

CWE(s)
CWE-120

Affected Products

tenda
w6-s firmware
1.0.0.4\(510\)

MITRE ATT&CK Enterprise Techniques

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Buffer overflow in public-facing web server function allows remote unauthenticated exploitation causing application crash, directly enabling Endpoint Denial of Service via Application or System Exploitation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References