{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5836","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-06T20:11:59.450Z","datePublished":"2025-06-07T13:31:06.620Z","dateUpdated":"2025-06-09T15:06:31.883Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-07T13:31:06.620Z"},"title":"Tenda AC9 POST Request SetIPTVCfg formSetIptv command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Tenda","product":"AC9","versions":[{"version":"15.03.02.13","status":"affected"}],"modules":["POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Tenda AC9 15.03.02.13. It has been rated as critical. This issue affects the function formSetIptv of the file /goform/SetIPTVCfg of the component POST Request Handler. The manipulation of the argument list leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Eine Schwachstelle wurde in Tenda AC9 15.03.02.13 ausgemacht. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion formSetIptv der Datei /goform/SetIPTVCfg der Komponente POST Request Handler. Durch Manipulation des Arguments list mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-06-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-06T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-06T22:17:03.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ysnysn (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.311579","name":"VDB-311579 | Tenda AC9 POST Request SetIPTVCfg formSetIptv command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.311579","name":"VDB-311579 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.591363","name":"Submit #591363 | Tenda AC9 V1.0 V15.03.02.13 Command Injection","tags":["third-party-advisory"]},{"url":"https://candle-throne-f75.notion.site/Tenda-AC9-formSetIptv-209df0aa11858061ae2bcbf83918d034","tags":["exploit"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"references":[{"url":"https://candle-throne-f75.notion.site/Tenda-AC9-formSetIptv-209df0aa11858061ae2bcbf83918d034","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-09T15:06:27.930039Z","id":"CVE-2025-5836","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-09T15:06:31.883Z"}}]}}