Overview
A significant vulnerability, CVE-2025-55606, has been identified in the Tenda AX3 V16.03.12.10_CN. This vulnerability, a Buffer Overflow in the fromAdvSetMacMtuWan function via the serverName parameter, could potentially allow an attacker to compromise systems or leak sensitive data. As Tenda AX3 is a widely used product, this vulnerability has extensive implications and warrants immediate attention.
Vulnerability Summary
CVE ID: CVE-2025-55606
Severity: High (7.5 CVSS Score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
Product | Affected Versions
Tenda AX3 | V16.03.12.10_CN
How the Exploit Works
The vulnerability is a Buffer Overflow in the fromAdvSetMacMtuWan function, which can be exploited via the serverName parameter. An attacker can send specially crafted data that, when processed by the fromAdvSetMacMtuWan function, causes the system to overwrite adjacent memory, potentially leading to arbitrary code execution or causing the system to crash.
Conceptual Example Code
An example of how the vulnerability might be exploited is shown below. The “serverName” parameter is filled with a large amount of data, causing a buffer overflow:
POST /fromAdvSetMacMtuWan HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "serverName": "AAAAAAAAA...[continue until buffer overflow]" }
Mitigation Guidance
The most effective mitigation strategy is to apply the official patch from the vendor. Until then, implementing a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation by detecting and blocking attempts to exploit this vulnerability.
