CVE-2025-60338
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-23
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | ac6_firmware | 15.03.06.50 |
| tenda | ac6 | 2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack overflow in the page parameter of the DhcpListClient function in Tenda AC6 V2.0 15.03.06.50. A stack overflow occurs when more data is written to a buffer on the stack than it can hold, which can corrupt data, crash the program, or allow an attacker to execute arbitrary code. In this case, the vulnerability allows attackers to cause a Denial of Service (DoS) by sending crafted input that triggers the overflow.
How can this vulnerability impact me? :
This vulnerability can impact you by causing a Denial of Service (DoS) on the affected device, which means the device may crash or become unresponsive due to the stack overflow triggered by malicious input. This can disrupt network connectivity or services relying on the Tenda AC6 router.