Cyber Posture

CVE-2025-29149

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
27 March 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0033 55.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2025-29149 is a stack-based buffer overflow vulnerability (CWE-121) affecting the Tenda i12 router running firmware version V1.0.0.10(3805). The flaw resides in the formSetAutoPing function, where the ping1 parameter triggers the overflow due to insufficient bounds checking on user-supplied input. This issue was publicly disclosed on March 20, 2025, and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to its potential for denial-of-service impacts.

An unauthenticated attacker can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By sending a specially crafted request to the vulnerable endpoint, the attacker can trigger a buffer overflow, leading to a crash of the affected component and potential denial of service on the device. The CVSS vector confirms no privileges, user interaction, or scope changes are needed, while confidentiality and integrity remain unaffected.

References point to a GitHub repository detailing the vulnerability, including what appears to be proof-of-concept information at https://github.com/Raining-101/IOT_cve/blob/main/tenda%20i12formSetAutoPing_ping1.md, though no official vendor advisories or patches are specified in available details.

Details

CWE(s)
CWE-121

Affected Products

tenda
i12 firmware
1.0.0.10\(3805\)

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The vulnerability is a remote unauthenticated buffer overflow in a public-facing web interface (formSetAutoPing on the router), directly enabling T1190 for initial exploitation. The resulting crash provides denial of service, mapping to T1499.004 via application/system exploitation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References