{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-8979","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-13T16:44:21.227Z","datePublished":"2025-08-14T19:32:07.086Z","dateUpdated":"2025-08-14T19:53:24.311Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-14T19:32:07.086Z"},"title":"Tenda AC15 Firmware Update check_fw data authenticity","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-345","lang":"en","description":"Insufficient Verification of Data Authenticity"}]}],"affected":[{"vendor":"Tenda","product":"AC15","versions":[{"version":"15.13.07.13","status":"affected"}],"modules":["Firmware Update Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in Tenda AC15 15.13.07.13. Affected by this vulnerability is the function check_fw_type/split_fireware/check_fw of the component Firmware Update Handler. The manipulation leads to insufficient verification of data authenticity. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es geht um die Funktion check_fw_type/split_fireware/check_fw der Komponente Firmware Update Handler. Durch das Manipulieren mit unbekannten Daten kann eine insufficient verification of data authenticity-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":7.5,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":6.6,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.6,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.8,"vectorString":"AV:N/AC:H/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-13T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-13T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-13T18:49:23.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"IOT_Res (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.319975","name":"VDB-319975 | Tenda AC15 Firmware Update check_fw data authenticity","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.319975","name":"VDB-319975 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.628602","name":"Submit #628602 | Tenda  AC15 V15.13.07.13 CWE-287 Improper Authentication","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.628603","name":"Submit #628603 | Tenda AC15 V15.13.07.13 CWE-20 Improper Input Validation (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/AC15_Auth.md","tags":["patch"]},{"url":"https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/AC15_Inte.md","tags":["exploit","patch"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-14T19:53:06.491288Z","id":"CVE-2025-8979","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-14T19:53:24.311Z"}}]}}