CVE-2025-14636: Use of Weak Hash in Tenda AX9
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-14636 identifies a cryptographic weakness in the Tenda AX9 router firmware version 22.03.01.46, specifically within the image_check function of the httpd component. This function is responsible for verifying the integrity and authenticity of firmware images before installation. The vulnerability arises from the use of a weak hash algorithm, which undermines the cryptographic assurance that the firmware image has not been tampered with. An attacker with network access can remotely exploit this flaw to bypass or weaken firmware verification, potentially allowing the installation of malicious firmware images. The attack complexity is high, indicating that exploitation requires significant skill or conditions, and no privileges or user interaction are necessary. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the network attack vector, high complexity, and limited impact on confidentiality and integrity, with no impact on availability. Although an exploit is publicly available, no confirmed in-the-wild exploitation has been reported. The vulnerability primarily threatens the integrity of the device firmware, which could lead to persistent compromise, unauthorized control, or data interception if exploited successfully. The lack of a patch at the time of reporting necessitates immediate risk mitigation through network controls and monitoring.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and confidentiality of network infrastructure relying on Tenda AX9 routers. Successful exploitation could allow attackers to install malicious firmware, leading to persistent backdoors, data interception, or network manipulation. This is particularly concerning for enterprises and critical infrastructure operators who depend on secure and trusted network devices. Although the attack complexity is high and no active exploitation is confirmed, the public availability of an exploit increases the risk over time. The impact on availability is minimal, but the potential for stealthy compromise could facilitate broader attacks or espionage. Organizations in sectors such as telecommunications, government, finance, and energy, where secure routing devices are critical, may face elevated risks. The medium severity rating suggests that while urgent, the threat is not immediately critical but requires proactive management to prevent exploitation.
Mitigation Recommendations
1. Monitor Tenda's official channels for firmware updates addressing CVE-2025-14636 and apply patches promptly once available. 2. Restrict remote management interfaces of Tenda AX9 routers to trusted IP addresses or disable them entirely if not required. 3. Employ network segmentation to isolate critical devices and reduce exposure of vulnerable routers to untrusted networks. 4. Implement strict access controls and authentication mechanisms for router management. 5. Use network intrusion detection systems (NIDS) to monitor for anomalous traffic patterns indicative of firmware tampering attempts. 6. Conduct regular firmware integrity checks and device audits to detect unauthorized modifications. 7. Consider replacing Tenda AX9 devices in high-risk environments with routers from vendors with stronger security track records if patching is delayed. 8. Educate IT staff about the vulnerability and signs of exploitation to enhance incident response readiness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14636: Use of Weak Hash in Tenda AX9
Description
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14636 identifies a cryptographic weakness in the Tenda AX9 router firmware version 22.03.01.46, specifically within the image_check function of the httpd component. This function is responsible for verifying the integrity and authenticity of firmware images before installation. The vulnerability arises from the use of a weak hash algorithm, which undermines the cryptographic assurance that the firmware image has not been tampered with. An attacker with network access can remotely exploit this flaw to bypass or weaken firmware verification, potentially allowing the installation of malicious firmware images. The attack complexity is high, indicating that exploitation requires significant skill or conditions, and no privileges or user interaction are necessary. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the network attack vector, high complexity, and limited impact on confidentiality and integrity, with no impact on availability. Although an exploit is publicly available, no confirmed in-the-wild exploitation has been reported. The vulnerability primarily threatens the integrity of the device firmware, which could lead to persistent compromise, unauthorized control, or data interception if exploited successfully. The lack of a patch at the time of reporting necessitates immediate risk mitigation through network controls and monitoring.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and confidentiality of network infrastructure relying on Tenda AX9 routers. Successful exploitation could allow attackers to install malicious firmware, leading to persistent backdoors, data interception, or network manipulation. This is particularly concerning for enterprises and critical infrastructure operators who depend on secure and trusted network devices. Although the attack complexity is high and no active exploitation is confirmed, the public availability of an exploit increases the risk over time. The impact on availability is minimal, but the potential for stealthy compromise could facilitate broader attacks or espionage. Organizations in sectors such as telecommunications, government, finance, and energy, where secure routing devices are critical, may face elevated risks. The medium severity rating suggests that while urgent, the threat is not immediately critical but requires proactive management to prevent exploitation.
Mitigation Recommendations
1. Monitor Tenda's official channels for firmware updates addressing CVE-2025-14636 and apply patches promptly once available. 2. Restrict remote management interfaces of Tenda AX9 routers to trusted IP addresses or disable them entirely if not required. 3. Employ network segmentation to isolate critical devices and reduce exposure of vulnerable routers to untrusted networks. 4. Implement strict access controls and authentication mechanisms for router management. 5. Use network intrusion detection systems (NIDS) to monitor for anomalous traffic patterns indicative of firmware tampering attempts. 6. Conduct regular firmware integrity checks and device audits to detect unauthorized modifications. 7. Consider replacing Tenda AX9 devices in high-risk environments with routers from vendors with stronger security track records if patching is delayed. 8. Educate IT staff about the vulnerability and signs of exploitation to enhance incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T01:55:39.525Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693dbe2f5e445230437e2446
Added to database: 12/13/2025, 7:27:43 PM
Last enriched: 12/20/2025, 8:06:50 PM
Last updated: 2/7/2026, 1:15:12 PM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.