Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14636: Use of Weak Hash in Tenda AX9

0
Medium
VulnerabilityCVE-2025-14636cvecve-2025-14636
Published: Sat Dec 13 2025 (12/13/2025, 19:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AX9

Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 12/20/2025, 20:06:50 UTC

Technical Analysis

CVE-2025-14636 identifies a cryptographic weakness in the Tenda AX9 router firmware version 22.03.01.46, specifically within the image_check function of the httpd component. This function is responsible for verifying the integrity and authenticity of firmware images before installation. The vulnerability arises from the use of a weak hash algorithm, which undermines the cryptographic assurance that the firmware image has not been tampered with. An attacker with network access can remotely exploit this flaw to bypass or weaken firmware verification, potentially allowing the installation of malicious firmware images. The attack complexity is high, indicating that exploitation requires significant skill or conditions, and no privileges or user interaction are necessary. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the network attack vector, high complexity, and limited impact on confidentiality and integrity, with no impact on availability. Although an exploit is publicly available, no confirmed in-the-wild exploitation has been reported. The vulnerability primarily threatens the integrity of the device firmware, which could lead to persistent compromise, unauthorized control, or data interception if exploited successfully. The lack of a patch at the time of reporting necessitates immediate risk mitigation through network controls and monitoring.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity and confidentiality of network infrastructure relying on Tenda AX9 routers. Successful exploitation could allow attackers to install malicious firmware, leading to persistent backdoors, data interception, or network manipulation. This is particularly concerning for enterprises and critical infrastructure operators who depend on secure and trusted network devices. Although the attack complexity is high and no active exploitation is confirmed, the public availability of an exploit increases the risk over time. The impact on availability is minimal, but the potential for stealthy compromise could facilitate broader attacks or espionage. Organizations in sectors such as telecommunications, government, finance, and energy, where secure routing devices are critical, may face elevated risks. The medium severity rating suggests that while urgent, the threat is not immediately critical but requires proactive management to prevent exploitation.

Mitigation Recommendations

1. Monitor Tenda's official channels for firmware updates addressing CVE-2025-14636 and apply patches promptly once available. 2. Restrict remote management interfaces of Tenda AX9 routers to trusted IP addresses or disable them entirely if not required. 3. Employ network segmentation to isolate critical devices and reduce exposure of vulnerable routers to untrusted networks. 4. Implement strict access controls and authentication mechanisms for router management. 5. Use network intrusion detection systems (NIDS) to monitor for anomalous traffic patterns indicative of firmware tampering attempts. 6. Conduct regular firmware integrity checks and device audits to detect unauthorized modifications. 7. Consider replacing Tenda AX9 devices in high-risk environments with routers from vendors with stronger security track records if patching is delayed. 8. Educate IT staff about the vulnerability and signs of exploitation to enhance incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T01:55:39.525Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693dbe2f5e445230437e2446

Added to database: 12/13/2025, 7:27:43 PM

Last enriched: 12/20/2025, 8:06:50 PM

Last updated: 2/7/2026, 1:15:12 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats