Tenda O3V2 1.0.0.12(3880) httpd /goform/setPingInfo fromNetToolGet ip ବଫର୍ ଓଭରଫ୍ଲୋ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu Tenda O3V2 1.0.0.12(3880) keessatti argameera. Miidhaan irra gahe is hojii fromNetToolGet faayilii /goform/setPingInfo keessa kutaa httpd keessa. Dhugumatti jijjiirraa irratti raawwatame ip gara ବଫର୍ ଓଭରଫ୍ଲୋ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-121 si geessa. Beekumsi kun yeroo 07/10/2025 ifoomsifameera. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2025-7417 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

3 ଆଡାପ୍ଟେସନ୍ · 90 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
07/10/2025 09:54 AM
ଅଦ୍ୟତନ 1/2
07/11/2025 01:36 AM
ଅଦ୍ୟତନ 2/2
07/11/2025 12:04 PM
software_vendorTendaTendaTenda
software_nameO3V2O3V2O3V2
software_version1.0.0.12(3880)1.0.0.12(3880)1.0.0.12(3880)
software_componenthttpdhttpdhttpd
software_file/goform/setPingInfo/goform/setPingInfo/goform/setPingInfo
software_functionfromNetToolGetfromNetToolGetfromNetToolGet
software_argumentipipip
vulnerability_cweCWE-121 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-121 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-121 (ବଫର୍ ଓଭରଫ୍ଲୋ)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cHHH
cvss3_vuldb_iHHH
cvss3_vuldb_aHHH
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_50/50.mdhttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_50/50.mdhttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_50/50.md
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_50/50.md#pochttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_50/50.md#pochttps://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_50/50.md#poc
source_cveCVE-2025-7417CVE-2025-7417CVE-2025-7417
cna_responsibleVulDBVulDBVulDB
cvss4_vuldb_acLLL
cvss4_vuldb_uiNNN
cvss4_vuldb_vcHHH
cvss4_vuldb_viHHH
cvss4_vuldb_vaHHH
cvss4_vuldb_ePPP
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_rlXXX
cvss4_vuldb_atNNN
cvss4_vuldb_prLLL
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore9.09.09.0
cvss2_vuldb_tempscore7.77.77.7
cvss3_vuldb_basescore8.88.88.8
cvss3_vuldb_tempscore8.08.08.0
cvss3_meta_basescore8.88.88.8
cvss3_meta_tempscore8.08.08.4
cvss4_vuldb_bscore8.78.78.7
cvss4_vuldb_btscore7.47.47.4
advisory_date1752098400 (07/10/2025)1752098400 (07/10/2025)1752098400 (07/10/2025)
price_0day$0-$5k$0-$5k$0-$5k
software_typeRouter Operating SystemRouter Operating SystemRouter Operating System
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciCCC
cvss2_vuldb_iiCCC
cvss2_vuldb_aiCCC
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss4_vuldb_avNNN
euvd_idEUVD-2025-21073EUVD-2025-21073
cve_nvd_summaryA vulnerability has been found in Tenda O3V2 1.0.0.12(3880) and classified as critical. Affected by this vulnerability is the function fromNetToolGet of the file /goform/setPingInfo of the component httpd. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcH
cvss4_cna_viH
cvss4_cna_vaH
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore8.7
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cH
cvss3_cna_iH
cvss3_cna_aH
cvss3_cna_basescore8.8
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciC
cvss2_cna_iiC
cvss2_cna_aiC
cvss2_cna_basescore9

Do you want to use VulDB in your project?

Use the official API to access entries easily!