A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://github.com/z472421519/BinaryAudit/blob/main/PoC/NPD/Tenda_W12/cgiWifiScheduledSet/cgiWifiScheduledSet.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.327709 | Permissions Required VDB Entry |
| https://vuldb.com/?id.327709 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.670118 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
| https://github.com/z472421519/BinaryAudit/blob/main/PoC/NPD/Tenda_W12/cgiWifiScheduledSet/cgiWifiScheduledSet.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-10-09 18:15
Updated : 2025-10-20 20:42
NVD link : CVE-2025-11550
Mitre link : CVE-2025-11550
CVE.ORG link : CVE-2025-11550
JSON object : View
Products Affected
tenda
- w12
- w12_firmware
