{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11550","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-09T11:14:52.099Z","datePublished":"2025-10-09T18:02:06.757Z","dateUpdated":"2026-02-24T06:56:06.954Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:56:06.954Z"},"title":"Tenda W12 HTTP Request modules wifiScheduledSet null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"Tenda","product":"W12","versions":[{"version":"3.0.0.6(3948)","status":"affected"}],"cpes":["cpe:2.3:o:tenda:w12_firmware:*:*:*:*:*:*:*:*"],"modules":["HTTP Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":7.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":6.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.8,"vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-09T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-10T08:27:17.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"z472421519 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.327709","name":"VDB-327709 | Tenda W12 HTTP Request modules wifiScheduledSet null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327709","name":"VDB-327709 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.670118","name":"Submit #670118 | Tenda W12 V3.0.0.6(3948) NULL Pointer Dereference","tags":["third-party-advisory"]},{"url":"https://github.com/z472421519/BinaryAudit/blob/main/PoC/NPD/Tenda_W12/cgiWifiScheduledSet/cgiWifiScheduledSet.md","tags":["exploit"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"references":[{"url":"https://github.com/z472421519/BinaryAudit/blob/main/PoC/NPD/Tenda_W12/cgiWifiScheduledSet/cgiWifiScheduledSet.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-09T19:23:49.607295Z","id":"CVE-2025-11550","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-09T19:23:52.962Z"}}]}}