Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2025-1851", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "state": "PUBLISHED", "assignerShortName": "VulDB", "dateReserved": "2025-03-02T20:04:35.439Z", "datePublished": "2025-03-03T05:00:07.574Z", "dateUpdated": "2025-03-03T17:19:41.764Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB", "dateUpdated": "2025-03-03T05:00:07.574Z"}, "title": "Tenda AC7 SetFirewallCfg formSetFirewallCfg stack-based overflow", "problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-121", "lang": "en", "description": "Stack-based Buffer Overflow"}]}, {"descriptions": [{"type": "CWE", "cweId": "CWE-119", "lang": "en", "description": "Memory Corruption"}]}], "affected": [{"vendor": "Tenda", "product": "AC7", "versions": [{"version": "15.03.06.0", "status": "affected"}, {"version": "15.03.06.1", "status": "affected"}, {"version": "15.03.06.2", "status": "affected"}, {"version": "15.03.06.3", "status": "affected"}, {"version": "15.03.06.4", "status": "affected"}, {"version": "15.03.06.5", "status": "affected"}, {"version": "15.03.06.6", "status": "affected"}, {"version": "15.03.06.7", "status": "affected"}, {"version": "15.03.06.8", "status": "affected"}, {"version": "15.03.06.9", "status": "affected"}, {"version": "15.03.06.10", "status": "affected"}, {"version": "15.03.06.11", "status": "affected"}, {"version": "15.03.06.12", "status": "affected"}, {"version": "15.03.06.13", "status": "affected"}, {"version": "15.03.06.14", "status": "affected"}, {"version": "15.03.06.15", "status": "affected"}, {"version": "15.03.06.16", "status": "affected"}, {"version": "15.03.06.17", "status": "affected"}, {"version": "15.03.06.18", "status": "affected"}, {"version": "15.03.06.19", "status": "affected"}, {"version": "15.03.06.20", "status": "affected"}, {"version": "15.03.06.21", "status": "affected"}, {"version": "15.03.06.22", "status": "affected"}, {"version": "15.03.06.23", "status": "affected"}, {"version": "15.03.06.24", "status": "affected"}, {"version": "15.03.06.25", "status": "affected"}, {"version": "15.03.06.26", "status": "affected"}, {"version": "15.03.06.27", "status": "affected"}, {"version": "15.03.06.28", "status": "affected"}, {"version": "15.03.06.29", "status": "affected"}, {"version": "15.03.06.30", "status": "affected"}, {"version": "15.03.06.31", "status": "affected"}, {"version": "15.03.06.32", "status": "affected"}, {"version": "15.03.06.33", "status": "affected"}, {"version": "15.03.06.34", "status": "affected"}, {"version": "15.03.06.35", "status": "affected"}, {"version": "15.03.06.36", "status": "affected"}, {"version": "15.03.06.37", "status": "affected"}, {"version": "15.03.06.38", "status": "affected"}, {"version": "15.03.06.39", "status": "affected"}, {"version": "15.03.06.40", "status": "affected"}, {"version": "15.03.06.41", "status": "affected"}, {"version": "15.03.06.42", "status": "affected"}, {"version": "15.03.06.43", "status": "affected"}, {"version": "15.03.06.44", "status": "affected"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, was found in Tenda AC7 up to 15.03.06.44. This affects the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "de", "value": "Es wurde eine kritische Schwachstelle in Tenda AC7 bis 15.03.06.44 gefunden. Betroffen hiervon ist die Funktion formSetFirewallCfg der Datei /goform/SetFirewallCfg. Durch Manipulieren des Arguments firewallEn mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."}], "metrics": [{"cvssV4_0": {"version": "4.0", "baseScore": 8.7, "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "baseSeverity": "HIGH"}}, {"cvssV3_1": {"version": "3.1", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseSeverity": "HIGH"}}, {"cvssV3_0": {"version": "3.0", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseSeverity": "HIGH"}}, {"cvssV2_0": {"version": "2.0", "baseScore": 9, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "timeline": [{"time": "2025-03-02T00:00:00.000Z", "lang": "en", "value": "Advisory disclosed"}, {"time": "2025-03-02T01:00:00.000Z", "lang": "en", "value": "VulDB entry created"}, {"time": "2025-03-02T21:09:38.000Z", "lang": "en", "value": "VulDB entry last update"}], "credits": [{"lang": "en", "value": "Raining101 (VulDB User)", "type": "reporter"}], "references": [{"url": "https://vuldb.com/?id.298119", "name": "VDB-298119 | Tenda AC7 SetFirewallCfg formSetFirewallCfg stack-based overflow", "tags": ["vdb-entry", "technical-description"]}, {"url": "https://vuldb.com/?ctiid.298119", "name": "VDB-298119 | CTI Indicators (IOB, IOC, IOA)", "tags": ["signature", "permissions-required"]}, {"url": "https://vuldb.com/?submit.505271", "name": "Submit #505271 | Tenda ac7 V15.03.06.44 Buffer Overflow", "tags": ["third-party-advisory"]}, {"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md", "tags": ["exploit"]}, {"url": "https://www.tenda.com.cn/", "tags": ["product"]}]}, "adp": [{"references": [{"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md", "tags": ["exploit"]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-03-03T17:19:37.187929Z", "id": "CVE-2025-1851", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-03-03T17:19:41.764Z"}}]}}