CVE-2025-12210

Tenda · Tenda O3

A high-severity vulnerability has been discovered in Tenda O3 networking equipment, identified as CVE-2025-12210.

Executive summary

A high-severity vulnerability has been discovered in Tenda O3 networking equipment, identified as CVE-2025-12210. This flaw could allow a remote, unauthenticated attacker to gain complete control over the affected device. Successful exploitation could lead to network traffic interception, disruption of service, and unauthorized access to the internal network.

Vulnerability

This vulnerability is a command injection flaw in the web-based management interface of the Tenda O3 device. An unauthenticated attacker can send a specially crafted HTTP request to a specific endpoint on the device's web server. The input is not properly sanitized before being passed to a system shell, allowing the attacker to execute arbitrary operating system commands with root-level privileges on the device.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. If exploited, an attacker could gain full administrative control of the network device, posing a significant risk to the organization. Potential consequences include eavesdropping on sensitive network traffic, modifying network configurations to redirect users to malicious sites, using the compromised device as a pivot point to attack other internal systems, or launching denial-of-service attacks that disrupt network connectivity and business operations.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately, prioritizing internet-facing or otherwise exposed devices. After patching, organizations should monitor for any signs of post-patch exploitation attempts and review historical access logs for indicators of compromise preceding the update.

Proactive Monitoring: Security teams should monitor for anomalous activity related to the affected devices. This includes inspecting web server logs for unusual or malformed requests to the management interface, monitoring for unexpected outbound network connections from the devices, and creating alerts for any unauthorized configuration changes or reboots.

Compensating Controls: If patching cannot be performed immediately, access to the device's web management interface should be strictly firewalled and restricted to a dedicated, trusted management network. Ensure the management interface is not exposed to the internet. If remote management is necessary, it should be done through a secure VPN with multi-factor authentication.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the critical nature of unauthenticated remote code execution vulnerabilities, we recommend that organizations treat this as a critical priority. Although this CVE is not currently on the CISA KEV list, its severity warrants immediate patching. All vulnerable Tenda O3 devices should be identified and updated immediately to prevent potential compromise of the network perimeter.