Stack-Based Buffer Overflow in Tenda W18E by Tenda Technologies
CVE-2025-3203
Key Information:
Badges
Summary
A stack-based buffer overflow vulnerability has been identified in the Tenda W18E product, specifically within the formSetAccountList function found in the /goform/setModules file. This vulnerability allows an attacker to manipulate the Password argument, potentially leading to remote code execution. The issue can be exploited without user interaction, making the Tenda W18E a critical target for malicious actors. The vulnerability has been publicly disclosed, highlighting the urgent need for users to secure their devices against possible exploits.
Affected Version(s)
W18E 16.01.0.11
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved