CVE-2025-63147: n/a
Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the deviceId parameter of the saveParentControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-63147 affects the Tenda AX3 router firmware version V16.03.12.10_CN. It is a stack-based buffer overflow located in the saveParentControlInfo function, specifically triggered by improper handling of the deviceId parameter. This flaw allows an unauthenticated remote attacker to send a specially crafted request to the device, causing a stack overflow that leads to a Denial of Service (DoS) condition by crashing or destabilizing the router. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), which typically results from insufficient bounds checking on input data. The CVSS v3.1 base score is 6.5, reflecting a medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) with no confidentiality or integrity impact. No patches or fixes have been released at the time of publication, and no exploits are known to be active in the wild. The vulnerability primarily threatens the availability of the device, potentially disrupting network connectivity for users relying on the affected routers. The lack of authentication and user interaction requirements increases the risk of exploitation in environments where the attacker can reach the router's management interface or network segment. This vulnerability highlights the importance of secure input validation and robust firmware development practices in consumer-grade networking equipment.
Potential Impact
For European organizations, the primary impact of CVE-2025-63147 is the potential disruption of network availability due to router crashes caused by the stack overflow. This can lead to temporary loss of internet connectivity, affecting business operations, remote work capabilities, and access to cloud services. Small and medium-sized enterprises (SMEs) and residential users relying on Tenda AX3 routers are particularly vulnerable, as these devices are commonly used in home and small office environments. The DoS condition could be exploited by attackers to cause targeted outages or as part of a larger attack campaign to disrupt network infrastructure. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects on productivity and service continuity. Additionally, the absence of patches increases the window of exposure, emphasizing the need for proactive mitigation. European critical infrastructure and organizations with remote workforce setups may face operational risks if their network edge devices are affected. The medium severity rating suggests a moderate threat level, but the ease of exploitation without authentication and user interaction elevates the urgency of addressing this vulnerability.
Mitigation Recommendations
1. Immediately restrict remote access to the Tenda AX3 router management interfaces, especially from untrusted networks, to reduce exposure to potential attackers. 2. Implement network segmentation to isolate routers from critical internal systems and limit the attack surface. 3. Monitor network traffic for unusual or malformed requests targeting the deviceId parameter or the saveParentControlInfo function, using intrusion detection systems (IDS) or network behavior analysis tools. 4. Disable or limit parental control features if not required, as the vulnerability is linked to the saveParentControlInfo function related to parental controls. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available to remediate the vulnerability. 6. Employ network-level protections such as firewalls and access control lists (ACLs) to block suspicious traffic patterns. 7. Educate users and administrators about the risks of using default or outdated firmware and encourage best practices for secure router configuration. 8. Consider replacing vulnerable devices with models from vendors with stronger security track records if timely patches are not forthcoming.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-63147: n/a
Description
Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the deviceId parameter of the saveParentControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-63147 affects the Tenda AX3 router firmware version V16.03.12.10_CN. It is a stack-based buffer overflow located in the saveParentControlInfo function, specifically triggered by improper handling of the deviceId parameter. This flaw allows an unauthenticated remote attacker to send a specially crafted request to the device, causing a stack overflow that leads to a Denial of Service (DoS) condition by crashing or destabilizing the router. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), which typically results from insufficient bounds checking on input data. The CVSS v3.1 base score is 6.5, reflecting a medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) with no confidentiality or integrity impact. No patches or fixes have been released at the time of publication, and no exploits are known to be active in the wild. The vulnerability primarily threatens the availability of the device, potentially disrupting network connectivity for users relying on the affected routers. The lack of authentication and user interaction requirements increases the risk of exploitation in environments where the attacker can reach the router's management interface or network segment. This vulnerability highlights the importance of secure input validation and robust firmware development practices in consumer-grade networking equipment.
Potential Impact
For European organizations, the primary impact of CVE-2025-63147 is the potential disruption of network availability due to router crashes caused by the stack overflow. This can lead to temporary loss of internet connectivity, affecting business operations, remote work capabilities, and access to cloud services. Small and medium-sized enterprises (SMEs) and residential users relying on Tenda AX3 routers are particularly vulnerable, as these devices are commonly used in home and small office environments. The DoS condition could be exploited by attackers to cause targeted outages or as part of a larger attack campaign to disrupt network infrastructure. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects on productivity and service continuity. Additionally, the absence of patches increases the window of exposure, emphasizing the need for proactive mitigation. European critical infrastructure and organizations with remote workforce setups may face operational risks if their network edge devices are affected. The medium severity rating suggests a moderate threat level, but the ease of exploitation without authentication and user interaction elevates the urgency of addressing this vulnerability.
Mitigation Recommendations
1. Immediately restrict remote access to the Tenda AX3 router management interfaces, especially from untrusted networks, to reduce exposure to potential attackers. 2. Implement network segmentation to isolate routers from critical internal systems and limit the attack surface. 3. Monitor network traffic for unusual or malformed requests targeting the deviceId parameter or the saveParentControlInfo function, using intrusion detection systems (IDS) or network behavior analysis tools. 4. Disable or limit parental control features if not required, as the vulnerability is linked to the saveParentControlInfo function related to parental controls. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available to remediate the vulnerability. 6. Employ network-level protections such as firewalls and access control lists (ACLs) to block suspicious traffic patterns. 7. Educate users and administrators about the risks of using default or outdated firmware and encourage best practices for secure router configuration. 8. Consider replacing vulnerable devices with models from vendors with stronger security track records if timely patches are not forthcoming.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6912165ecab732a2636e7148
Added to database: 11/10/2025, 4:44:14 PM
Last enriched: 11/18/2025, 5:27:59 PM
Last updated: 11/19/2025, 12:46:58 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64515: CWE-20: Improper Input Validation in open-formulieren open-forms
MediumCVE-2025-65015: CWE-770: Allocation of Resources Without Limits or Throttling in authlib joserfc
CriticalCVE-2025-65012: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getkirby kirby
MediumCVE-2025-64325: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in EmbySupport Emby.Security
HighCVE-2025-54990: CWE-276: Incorrect Default Permissions in xwikisas application-admintools
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.