{"id":34298,"date":"2025-05-03T07:51:18","date_gmt":"2025-05-03T07:51:18","guid":{"rendered":""},"modified":"2025-05-29T11:44:24","modified_gmt":"2025-05-29T17:44:24","slug":"cve-2025-4007-critical-stack-based-buffer-overflow-vulnerability-in-tenda-w12-and-i24","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-4007-critical-stack-based-buffer-overflow-vulnerability-in-tenda-w12-and-i24\/","title":{"rendered":"<strong>CVE-2025-4007: Critical Stack-Based Buffer Overflow Vulnerability in Tenda W12 and i24<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>A severe vulnerability, classified as critical, has been identified in Tenda W12 and i24, two popular devices that many businesses and individuals use for networking purposes. This cyber vulnerability, officially designated as CVE-2025-4007, impacts version 3.0.0.4(2887)\/3.0.0.5(3644) of these devices. It is centered around the function cgidhcpsCfgSet of the file \/goform\/modules of the httpd component, leading to stack-based <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-28024-buffer-overflow-vulnerability-in-totolink-a810r-v4-1-2cu-5182-b20201026\/\"  data-wpil-monitor-id=\"39573\">buffer overflow<\/a>. This vulnerability is especially concerning because the exploit has been disclosed publicly, opening a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-28169-unencrypted-broadcasts-lead-to-potential-man-in-the-middle-attacks-on-byd-qin-plus-dm-i-dilink-os\/\"  data-wpil-monitor-id=\"40640\">potential door for cybercriminals to launch attacks<\/a> remotely, compromising systems and leaking sensitive data.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-4007<br \/>\nSeverity: Critical, with a CVSS Severity Score of 8.8<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32849-vulnerability-in-telecontrol-server-basic-leads-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"39224\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3305664029\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3803-critical-vulnerability-in-tenda-w12-and-i24-3-0-0-4-3-0-0-5-resulting-in-stack-based-buffer-overflow\/\"  data-wpil-monitor-id=\"41551\">Tenda W12<\/a> | 3.0.0.4(2887)\/3.0.0.5(3644)<br \/>\n<a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3820-critical-buffer-overflow-vulnerability-in-tenda-w12-and-i24-routers\/\"  data-wpil-monitor-id=\"41712\">Tenda i24<\/a> | 3.0.0.4(2887)\/3.0.0.5(3644)<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-21633-critical-path-manipulation-vulnerability-in-apktool\/\"  data-wpil-monitor-id=\"41115\">vulnerability arises from the manipulation<\/a> of the &#8216;json&#8217; argument in the function &#8216;cgidhcpsCfgSet&#8217; of the file &#8216;\/goform\/modules&#8217; in the &#8216;httpd&#8217; component. The manipulated &#8216;json&#8217; argument leads to a stack-based <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3619-critical-heap-buffer-overflow-vulnerability-in-google-chrome-codecs\/\"  data-wpil-monitor-id=\"40055\">buffer overflow<\/a>. This overflow condition gives an <a href=\"https:\/\/www.ameeba.com\/blog\/ahold-delhaize-cyber-attack-unpacking-the-data-breach-and-its-implications\/\"  data-wpil-monitor-id=\"39223\">attacker the ability to overwrite the intended data<\/a> of the buffer, leading to the execution of arbitrary code, crashing the system, or causing a denial of service.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-4241940068\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47154-exploitation-of-use-after-free-vulnerability-in-libjs-in-ladybird\/\"  data-wpil-monitor-id=\"50692\">vulnerability might be exploited<\/a>. This is a sample <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4827-critical-buffer-overflow-vulnerability-in-totolink-http-post-request-handler\/\"  data-wpil-monitor-id=\"50931\">HTTP request<\/a>.<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/goform\/modules HTTP\/1.1\nHost: target-Tenda-device.com\nContent-Type: application\/json\n{\n&quot;json&quot;: &quot;A&quot;*5000 \/\/ Overly long string triggering buffer overflow\n}<\/code><\/pre>\n<p>In this example, the overly long string &#8220;A&#8221;*5000 is sent as the &#8216;json&#8217; argument. This string is long enough to trigger a buffer overflow, potentially allowing an attacker to execute <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-43958-arbitrary-file-upload-vulnerability-in-hospital-management-system-v4-0\/\"  data-wpil-monitor-id=\"39719\">arbitrary code or crash the system<\/a>.<br \/>\nPlease note that this example is conceptual and not meant to be used for malicious activities. Always <a href=\"https:\/\/www.ameeba.com\/blog\/ftc-mandates-godaddy-cybersecurity-upgrades-following-triple-breach\/\"  data-wpil-monitor-id=\"50691\">follow ethical cybersecurity<\/a> practices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview A severe vulnerability, classified as critical, has been identified in Tenda W12 and i24, two popular devices that many businesses and individuals use for networking purposes. This cyber vulnerability, officially designated as CVE-2025-4007, impacts version 3.0.0.4(2887)\/3.0.0.5(3644) of these devices. It is centered around the function cgidhcpsCfgSet of the file \/goform\/modules of the httpd component, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[103],"product":[104],"attack_vector":[86,87],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-34298","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-apache","product-apache-httpd","attack_vector-buffer-overflow","attack_vector-dos"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=34298"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34298\/revisions"}],"predecessor-version":[{"id":45583,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34298\/revisions\/45583"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=34298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=34298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=34298"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=34298"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=34298"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=34298"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=34298"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=34298"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=34298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}