Cyber Posture

CVE-2025-29357

HighPublic PoC

Published: 13 March 2025

Published
13 March 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0020 41.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-29357 is a buffer overflow vulnerability affecting the Tenda RX3 router on firmware version US_RX3V1.0br_V16.03.13.11_multi_TDE01. The issue resides in the /goform/SetPptpServerCfg endpoint, where the startIp and endIp parameters can trigger the overflow. Published on 2025-03-13, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and maps to CWE-404.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By sending a specially crafted packet to the vulnerable endpoint, they can cause a buffer overflow, resulting in a Denial of Service (DoS) that disrupts router availability.

A reference document detailing the vulnerability is available at https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_4.pdf.

Details

CWE(s)
CWE-404

Affected Products

tenda
rx3 firmware
16.03.13.11_multi_tde01

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The buffer overflow in the public-facing /goform/SetPptpServerCfg web endpoint on the Tenda RX3 router allows unauthenticated remote exploitation over the network to cause DoS, directly mapping to T1190 Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References