Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14636: Use of Weak Hash in Tenda AX9

0
Medium
VulnerabilityCVE-2025-14636cvecve-2025-14636
Published: Sat Dec 13 2025 (12/13/2025, 19:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AX9

Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 12/13/2025, 19:29:06 UTC

Technical Analysis

CVE-2025-14636 identifies a cryptographic weakness in the Tenda AX9 router firmware version 22.03.01.46, specifically within the image_check function of the embedded httpd service. This function is responsible for verifying the integrity and authenticity of firmware images before installation. The vulnerability stems from the use of a weak hash algorithm during this verification process, which can be manipulated by a remote attacker to bypass integrity checks. This could allow an attacker to install malicious firmware or alter the device's software state without detection. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), but the attack complexity is high (AC:H), indicating that exploitation requires significant effort or specialized knowledge. The impact on confidentiality is none, but there is a low impact on integrity (VI:L) and no impact on availability or other security properties. Although the exploit code has been publicly released, no known exploits in the wild have been reported, suggesting limited active exploitation. The vulnerability affects only firmware version 22.03.01.46, and no official patches have been linked yet. The weakness could be leveraged in targeted attacks to compromise network infrastructure by installing unauthorized firmware, potentially leading to persistent device control or data interception.

Potential Impact

For European organizations, this vulnerability poses a risk to network infrastructure security where Tenda AX9 routers are deployed. Successful exploitation could allow attackers to bypass firmware integrity checks and install malicious firmware, leading to device compromise. This may result in unauthorized access to internal networks, interception or manipulation of network traffic, and potential lateral movement within organizational environments. Given the high attack complexity and lack of reported active exploitation, the immediate risk is moderate. However, the public availability of exploit code increases the likelihood of future attacks, especially targeting critical infrastructure or high-value networks. Organizations relying on Tenda AX9 routers without timely firmware updates or compensating controls may face increased exposure to espionage, data breaches, or service disruption. The impact is particularly relevant for sectors with stringent security requirements such as government, finance, and telecommunications within Europe.

Mitigation Recommendations

1. Monitor Tenda's official channels for firmware updates addressing CVE-2025-14636 and apply patches promptly once available. 2. In the absence of patches, restrict network access to the management interfaces of Tenda AX9 routers using firewall rules or network segmentation to limit exposure to untrusted networks. 3. Implement network intrusion detection/prevention systems (IDS/IPS) to detect anomalous firmware update attempts or suspicious HTTP traffic targeting the router. 4. Conduct regular integrity checks and audits of router firmware versions and configurations to detect unauthorized changes. 5. Employ strong network access controls and authentication mechanisms to reduce the risk of unauthorized remote access. 6. Consider replacing vulnerable devices in high-security environments if timely patches are unavailable. 7. Educate network administrators about the vulnerability and the importance of monitoring for signs of compromise related to firmware tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T01:55:39.525Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693dbe2f5e445230437e2446

Added to database: 12/13/2025, 7:27:43 PM

Last enriched: 12/13/2025, 7:29:06 PM

Last updated: 12/13/2025, 11:11:31 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats