CVE Alert: CVE-2025-12214 – Tenda – O3

CVE-2025-12214

HIGHNo exploitation known

A vulnerability was detected in Tenda O3 1.0.0.10(2478). This issue affects the function SetValue/GetValue of the file /goform/sysAutoReboot. Performing manipulation of the argument enable results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

CVSS v3.1 (8.8)
Vendor
Tenda
Product
O3
Versions
1.0.0.10(2478)
CWE
CWE-121, Stack-based Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-27T04:02:10.027Z
Updated
2025-10-27T04:02:10.027Z

AI Summary Analysis

Risk verdict

High risk with urgent attention due to a publicly exploited, remote, stack-based overflow that can compromise the device.

Why this matters

The vulnerability enables remote control with no user interaction, risking full device takeover and potential pivot to other network assets. In practice, attacker objectives may include persistent access, botnet recruitment, and data exfiltration, which is particularly critical for IoT/edge deployments exposed to the internet or poorly segmented networks.

Most likely attack path

An attacker on the network could trigger the overflow by sending crafted input to the vulnerable interface; no user action is required. The exploit requires only network access and limited privileges on the device, with high impact on confidentiality, integrity and availability if successful, making lateral movement possible within the local network.

Who is most exposed

Devices with exposed management interfaces (typical consumer IoT/routers) are at greatest risk, especially when WAN access is enabled or poorly segmented. Deployments with default credentials or weak access controls worsen exposure.

Detection ideas

  • Unusual rebooting or crashing events tied to management endpoints.
  • Logs showing repeated, crafted requests to the vulnerable function or endpoint.
  • Memory corruption indicators: unexpected process crashes or kernel/user space instability.
  • Spike in network traffic targeting the device’s management port.
  • Post-incident indicators: unusual process spawning or core dumps following suspected probes.

Mitigation and prioritisation

  • Apply the vendor patch or firmware update as a priority when available.
  • Disable or restrict remote management interfaces to trusted networks; enforce strict access controls.
  • Implement network segregation and firewall rules to limit inbound access to the device.
  • Monitor and alert on abnormal crashes, reboots or management traffic bursts.
  • If KEV is confirmed or EPSS ≥ 0.5, treat as priority 1; otherwise, escalate to high priority and coordinate a patch window promptly. If patch timelines are uncertain, implement compensating controls and test in a staged environment.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features