Overview
A high-severity vulnerability, CVE-2025-57078, has been identified in Tenda G3 v3.0br_V15.11.0.17 devices. This vulnerability results from a stack overflow in the pppoeServerWhiteMacIndex parameter in the formModifyPppAuthWhiteMac function. The security flaw presents a significant risk as it allows attackers to initiate a Denial of Service (DoS) attack via a specially crafted request, potentially leading to system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-57078
Severity: High (CVSS v3 score: 7.5)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: Denial of Service, Potential system compromise, and Data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Tenda G3 | v3.0br_V15.11.0.17
How the Exploit Works
The vulnerability stems from a stack overflow condition in the pppoeServerWhiteMacIndex parameter within the formModifyPppAuthWhiteMac function. This condition can be exploited by an attacker by sending a specially crafted request that exceeds the buffer limits, causing the system to crash or behave unexpectedly. This can lead to a Denial of Service (DoS) condition or potentially allow the attacker to execute arbitrary code on the device.
Conceptual Example Code
Below is a conceptual example of how an attacker might exploit this vulnerability:
POST /formModifyPppAuthWhiteMac HTTP/1.1
Host: target.example.com
Content-Type: application/x-www-form-urlencoded
pppoeServerWhiteMacIndex=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
In the above example, the “A” character is used to represent an overly large value being passed to the pppoeServerWhiteMacIndex parameter. The actual exploit would involve specifically crafted data designed to exploit the overflow condition.
