Cyber Posture

CVE-2025-29137

CriticalPublic PoC

Published: 19 March 2025

Published
19 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0043 62.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-29137 is a buffer overflow vulnerability (CWE-120) affecting the Tenda AC7 V1.0 router on firmware version V15.03.06.44. The flaw occurs in the form_fast_setting_wifi_set function due to improper handling of the timeZone parameter, which can trigger a buffer overflow and lead to remote code execution (RCE). Published on 2025-03-19, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.

An unauthenticated attacker with network access can exploit this vulnerability remotely by sending a specially crafted request targeting the timeZone parameter. The low attack complexity and lack of required privileges or user interaction enable straightforward exploitation, resulting in high-impact compromise of confidentiality, integrity, and availability on the device, including full RCE capabilities.

Mitigation details and technical analysis are available in the referenced advisory at https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac7form_fast_setting_wifi_set%20timeZone.md.

Details

CWE(s)
CWE-120

Affected Products

tenda
ac7 firmware
15.03.06.44

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in public-facing web form handler (form_fast_setting_wifi_set) on router enables unauthenticated remote exploitation for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References