CVE Alert: CVE-2025-12212 – Tenda – O3
CVE-2025-12212
A weakness has been identified in Tenda O3 1.0.0.10(2478). This affects the function SetValue/GetValue of the file /goform/setNetworkService. This manipulation of the argument upnpEn causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
AI Summary Analysis
**Risk verdict**: High-risk remote code execution vulnerability with a publicly available exploit; urgency is warranted.
**Why this matters**: The flaw enables arbitrary code execution on reachable devices, with full impact on confidentiality, integrity and availability. In IoT/home-network deployments, attacker footholds can seed botnets, pivot to LAN devices, or disrupt critical services. The presence of a public exploit increases likelihood of active abuse, potentially affecting multiple consumer or small-business networks.
**Most likely attack path**: Exploitation pivots on a remote, network-accessible buffer overflow in the SetValue/GetValue path via /goform/setNetworkService, requiring low privileges and no user interaction. An automated attacker could send crafted input to overflow the stack, gain control of the device, and pursue further network access or persistence. Lack of user interaction plus public PoC suggests rapid, opportunistic exploitation and potential lateral movement within local networks.
**Who is most exposed**: Consumer and small-business routers with UPnP enabled and exposed management interfaces are most at risk; deployments with WAN-side management or misconfigured port-forwarding are particularly vulnerable.
**Detection ideas**:
- Alerts for attempts to access /goform/setNetworkService with oversized or malformed upnpEn fields.
- Unusual device reboots or stack trace/crash logs on the affected device.
- Anomalous outbound/ LAN traffic after access attempts to the device.
- Signatures or IOC patterns from public advisories or exploit traces.
**Mitigation and prioritisation**:
- Apply the vendor patch or firmware upgrade as a priority; verify version 1.0.0.10(2478) remediation is implemented.
- If patching is delayed, disable UPnP and limit WAN management to trusted networks; implement strict access controls and network segmentation.
- Monitor for exploit indicators and apply targeted firewall rules to restrict access to the device admin interface.
- Establish change-management notes and test firmware in a lab before wide rollout.
- If KEV is true or EPSS ≥ 0.5, treat as priority 1. If not confirmed, treat as high priority.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
