CVE Alert: CVE-2025-12210 – Tenda – O3

CVE-2025-12210

HIGHNo exploitation known

A vulnerability was identified in Tenda O3 1.0.0.10(2478). Affected by this vulnerability is the function SetValue/GetValue of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

CVSS v3.1 (8.8)
Vendor
Tenda
Product
O3
Versions
1.0.0.10(2478)
CWE
CWE-121, Stack-based Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-27T03:02:13.722Z
Updated
2025-10-27T03:02:13.722Z

AI Summary Analysis

Risk verdict

Critical risk: remote, low-privilege exploitation with publicly available PoC; requires urgent attention.

Why this matters

The stack-based overflow in the LANIP parameter could allow full device compromise, enabling attacker control over the router, data exfiltration, and potential lateral movement into connected networks. Given the high impact on confidentiality, integrity and availability, an automated weaponisation workflow is plausible.

Most likely attack path

Exploitation can be triggered over the network without user interaction, with the attacker likely already holding low privileges. Successful overflow yields code execution on the AP/firmware context, potentially elevating to full device compromise. With Scope unchanged, consequences include persistent control of the device and subsequent access to adjacent hosts or traffic.

Who is most exposed

Primarily consumer and small-office routers running Tenda O3 in typical home/SMB deployments, often exposed to the internet via WAN management or misconfigured port forwards. Devices in mixed-vendor LANs with internet-facing admin interfaces are at elevated risk.

Detection ideas

  • spikes or crashes linked to traffic to /goform/AdvSetLanip; memory corruption indicators in device logs
  • unusual, long lanIp values in SetValue/GetValue attempts
  • repeated failed attempts from external IPs targeting router admin endpoints
  • unexpected reboots or new processes after specific config requests
  • anomalous CPU/memory usage during admin traffic

Mitigation and prioritisation

  • Apply patched firmware as soon as available; if patch not yet deployed, disable remote management and WAN-admin access; enforce strong network segmentation.
  • Implement allow-listing for management interfaces; block unused protocols (Telnet/SSHD) on WAN
  • Deploy/verify IDS signatures for AdvSetLanip abuse; monitor for suspicious config-change traffic
  • Validate automatic updates and enable them; maintain backups of configuration
  • If asset critical or exposure high, treat as priority 2 with rapid remediation.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features