Tenda O3V2 1.0.0.12(3880) httpd /goform/setPingInfo fromNetToolGet domain kura hakki ndiyam

Gaskiya vulnerability da aka ware a matsayin kura an samu a Tenda O3V2 1.0.0.12(3880). Hakika, aikin fromNetToolGet ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /goform/setPingInfo, a cikin sashen httpd. A sa manipulation of the argument domain ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-78. Hakika, rauni an bayyana shi 07/10/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-7414. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Once again VulDB remains the best source for vulnerability data.

2 Goyarwa · 59 Datenpunkte

FurɗeSúgá
07/10/2025 09:54
Gargadi 1/1
07/11/2025 00:38
software_vendorTendaTenda
software_nameO3V2O3V2
software_version1.0.0.12(3880)1.0.0.12(3880)
software_componenthttpdhttpd
software_file/goform/setPingInfo/goform/setPingInfo
software_functionfromNetToolGetfromNetToolGet
software_argumentdomaindomain
vulnerability_cweCWE-78 (kura hakki ndiyam)CWE-78 (kura hakki ndiyam)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_47/47.mdhttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_47/47.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_47/47.md#pochttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_47/47.md#poc
source_cveCVE-2025-7414CVE-2025-7414
cna_responsibleVulDBVulDB
software_typeRouter Operating SystemRouter Operating System
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.56.5
cvss2_vuldb_tempscore5.65.6
cvss3_vuldb_basescore6.36.3
cvss3_vuldb_tempscore5.75.7
cvss3_meta_basescore6.36.3
cvss3_meta_tempscore5.75.7
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1752098400 (07/10/2025)1752098400 (07/10/2025)
price_0day$0-$5k$0-$5k
euvd_idEUVD-2025-21061

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!