Severity
8.7HIGH
EPSS
0.6%
top 29.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 19
Latest updateMay 8

Description

A vulnerability was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644) and classified as critical. Affected by this issue is the function cgiSysUplinkCheckSet of the file /bin/httpd. The manipulation of the argument hostIp1/hostIp2 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

CVEListV5tenda/i243.0.0.4(2887), 3.0.0.5(3644)+1
CVEListV5tenda/w123.0.0.4(2887), 3.0.0.5(3644)+1
NVDtenda/i24_firmware3.0.0.4\(2887\), 3.0.0.5\(3644\)+1
NVDtenda/w12_firmware3.0.0.4\(2887\), 3.0.0.5\(3644\)+1

🔴Vulnerability Details

2
CVEList
Tenda W12/i24 httpd cgiSysUplinkCheckSet stack-based overflow2025-04-19
GHSA
GHSA-f9cw-7mcv-gq63: A vulnerability was found in Tenda W12 and i24 32025-04-19

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Tenda sysUplinkCheckSet hostIp parameters Buffer Overflow Attempt (CVE-2025-3820)2025-05-08