Cyber Posture

CVE-2025-29031

CriticalPublic PoC

Published: 14 March 2025

Published
14 March 2025
Modified
19 March 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 33.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-29031 is a buffer overflow vulnerability (CWE-787) affecting Tenda AC6 router firmware version v15.03.05.16, specifically in the fromAddressNat function. Published on 2025-03-14T14:15:18.430, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.

The vulnerability enables remote exploitation over the network with low complexity, requiring no authentication privileges or user interaction. Attackers can achieve high confidentiality, integrity, and availability impacts, potentially resulting in arbitrary code execution or complete device compromise.

Mitigation details are available in the referenced advisory at https://github.com/WhereisDoujo/CVE/issues/5.

Details

CWE(s)
CWE-787

Affected Products

tenda
ac6 firmware
15.03.05.16

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated buffer overflow in the router's web management interface (/goform/addressNat) via user-controlled parameters enables exploitation of a public-facing application, potentially leading to remote code execution or denial of service.

References