CVE-2025-5863
BaseFortify
Publication date: 2025-06-09
Last updated on: 2025-06-09
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | ac5_firmware | 15.03.06.47 |
| tenda | ac5 | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in the Tenda AC5 router firmware version 15.03.06.47. It occurs in the function formSetRebootTimer at the /goform/SetRebootTimer endpoint. The issue arises from improper handling of the rebootTime parameter, which allows an attacker to overflow the stack by sending crafted input. This can lead to arbitrary code execution or denial of service by overwriting stack memory during the reboot timer setting process. [1, 2]
How can this vulnerability impact me? :
Exploitation of this vulnerability can compromise the confidentiality, integrity, and availability of the affected device. An attacker can remotely exploit the flaw without authentication, potentially executing arbitrary code or causing a denial of service. This can disrupt network operations and expose the device to further attacks. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can focus on monitoring requests to the /goform/SetRebootTimer endpoint with unusual or malformed rebootTime parameters that could trigger the buffer overflow. Network intrusion detection systems (NIDS) or web application firewalls (WAF) can be configured to alert on HTTP POST requests targeting /goform/SetRebootTimer with suspicious payloads. Specific commands are not provided in the resources, but using tools like curl or wget to test the endpoint with crafted rebootTime values may help identify vulnerable devices. For example, sending a POST request with an excessively long rebootTime parameter to the endpoint and observing the device's response or crash behavior could indicate vulnerability. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include replacing the affected Tenda AC5 device running firmware version 15.03.06.47 with an alternative product, as no known countermeasures or patches currently exist. Additionally, restricting network access to the /goform/SetRebootTimer endpoint, implementing firewall rules to block unauthorized remote access, and monitoring for exploit attempts can help reduce risk until the device is replaced. [2]