CVE-2023-51812: n/a in n/a
Tenda AX3 v16.03.12.11 was discovered to contain a remote code execution (RCE) vulnerability via the list parameter at /goform/SetNetControlList.
AI Analysis
Technical Summary
CVE-2023-51812 is a critical remote code execution (RCE) vulnerability identified in the Tenda AX3 router firmware version 16.03.12.11. The vulnerability arises from improper input validation of the 'list' parameter in the /goform/SetNetControlList endpoint. This flaw is classified under CWE-77, which relates to improper neutralization of special elements used in a command ('Command Injection'). An attacker can exploit this vulnerability remotely without authentication or user interaction, by sending specially crafted requests to the vulnerable endpoint. Successful exploitation allows the attacker to execute arbitrary commands on the router with the privileges of the underlying process, potentially leading to full system compromise. The CVSS v3.1 base score is 9.8, reflecting the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation over the network without any privileges or user interaction. Although no known exploits are currently reported in the wild, the severity and nature of this vulnerability make it a significant threat to affected devices. The lack of an official patch or vendor project information at the time of publication increases the urgency for mitigation and monitoring.
Potential Impact
For European organizations, especially those relying on Tenda AX3 routers for network connectivity, this vulnerability poses a severe risk. Exploitation could lead to unauthorized control over network infrastructure, enabling attackers to intercept, modify, or disrupt network traffic, deploy malware, or pivot to internal systems. This could compromise sensitive data confidentiality, disrupt business operations, and damage organizational reputation. Small and medium enterprises (SMEs) and home office setups that use consumer-grade routers like the Tenda AX3 may be particularly vulnerable due to less stringent network security controls. Additionally, critical infrastructure sectors that utilize these devices for connectivity could face operational disruptions or espionage risks. The absence of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of automated exploitation attempts targeting exposed devices across Europe.
Mitigation Recommendations
Immediate mitigation steps should include isolating affected Tenda AX3 routers from untrusted networks and restricting access to the /goform/SetNetControlList endpoint via network segmentation or firewall rules. Network administrators should monitor network traffic for unusual requests targeting this endpoint and implement intrusion detection/prevention systems (IDS/IPS) signatures to detect exploitation attempts. Until an official patch is released, consider replacing vulnerable devices with alternative hardware from vendors with timely security updates. If replacement is not feasible, disable remote management features and restrict router management access to trusted internal networks only. Regularly audit router firmware versions and subscribe to vendor security advisories to apply patches promptly once available. Additionally, organizations should conduct internal network scans to identify vulnerable devices and assess exposure. Employing network-level anomaly detection can help identify exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-51812: n/a in n/a
Description
Tenda AX3 v16.03.12.11 was discovered to contain a remote code execution (RCE) vulnerability via the list parameter at /goform/SetNetControlList.
AI-Powered Analysis
Technical Analysis
CVE-2023-51812 is a critical remote code execution (RCE) vulnerability identified in the Tenda AX3 router firmware version 16.03.12.11. The vulnerability arises from improper input validation of the 'list' parameter in the /goform/SetNetControlList endpoint. This flaw is classified under CWE-77, which relates to improper neutralization of special elements used in a command ('Command Injection'). An attacker can exploit this vulnerability remotely without authentication or user interaction, by sending specially crafted requests to the vulnerable endpoint. Successful exploitation allows the attacker to execute arbitrary commands on the router with the privileges of the underlying process, potentially leading to full system compromise. The CVSS v3.1 base score is 9.8, reflecting the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation over the network without any privileges or user interaction. Although no known exploits are currently reported in the wild, the severity and nature of this vulnerability make it a significant threat to affected devices. The lack of an official patch or vendor project information at the time of publication increases the urgency for mitigation and monitoring.
Potential Impact
For European organizations, especially those relying on Tenda AX3 routers for network connectivity, this vulnerability poses a severe risk. Exploitation could lead to unauthorized control over network infrastructure, enabling attackers to intercept, modify, or disrupt network traffic, deploy malware, or pivot to internal systems. This could compromise sensitive data confidentiality, disrupt business operations, and damage organizational reputation. Small and medium enterprises (SMEs) and home office setups that use consumer-grade routers like the Tenda AX3 may be particularly vulnerable due to less stringent network security controls. Additionally, critical infrastructure sectors that utilize these devices for connectivity could face operational disruptions or espionage risks. The absence of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of automated exploitation attempts targeting exposed devices across Europe.
Mitigation Recommendations
Immediate mitigation steps should include isolating affected Tenda AX3 routers from untrusted networks and restricting access to the /goform/SetNetControlList endpoint via network segmentation or firewall rules. Network administrators should monitor network traffic for unusual requests targeting this endpoint and implement intrusion detection/prevention systems (IDS/IPS) signatures to detect exploitation attempts. Until an official patch is released, consider replacing vulnerable devices with alternative hardware from vendors with timely security updates. If replacement is not feasible, disable remote management features and restrict router management access to trusted internal networks only. Regularly audit router firmware versions and subscribe to vendor security advisories to apply patches promptly once available. Additionally, organizations should conduct internal network scans to identify vulnerable devices and assess exposure. Employing network-level anomaly detection can help identify exploitation attempts early.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f45d9182aa0cae28897dc
Added to database: 6/3/2025, 6:58:33 PM
Last enriched: 7/4/2025, 1:25:32 PM
Last updated: 11/25/2025, 8:46:28 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13502: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 6
HighCVE-2025-59372: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ASUS Router
MediumCVE-2025-59371: CWE-330: Use of Insufficiently Random Values in ASUS Router
HighCVE-2025-59370: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS Router
HighCVE-2025-59369: CWE-89: Improper Neutralization of Special Elements used in an SQLCommand ('SQL Injection') in ASUS Router
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.