CVE-2025-63149: n/a
Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the urls parameter of the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-63149 is a stack-based buffer overflow vulnerability identified in the Tenda AX3 router firmware version V16.03.12.10_CN. The vulnerability resides in the get_parentControl_list_Info function, which processes the 'urls' parameter. Due to insufficient bounds checking, an attacker can send a crafted request containing an overly long or malformed 'urls' parameter, triggering a stack overflow. This overflow can overwrite the stack, leading to a crash of the router’s firmware process and causing a Denial of Service (DoS) by making the device unresponsive or rebooting it. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score is 7.5, indicating high severity primarily due to the impact on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). As of the publication date, no patches or known exploits are publicly available. The lack of a patch means affected devices remain vulnerable, posing a risk especially in environments where these routers are deployed without adequate network protections. The Tenda AX3 is a popular consumer-grade Wi-Fi 6 router, often used in small office/home office (SOHO) settings, which may be part of European organizational networks, particularly in SMEs.
Potential Impact
The primary impact of CVE-2025-63149 is on the availability of network infrastructure relying on the Tenda AX3 router. Exploitation results in a Denial of Service, potentially causing network outages or degraded connectivity for users dependent on the affected device. For European organizations, especially small and medium enterprises (SMEs) and home office workers using these routers, this could disrupt business operations, remote work, and communications. The vulnerability does not compromise confidentiality or integrity directly, but the loss of network availability can have cascading effects on productivity and service delivery. Additionally, repeated exploitation attempts could lead to increased operational costs due to troubleshooting and device replacement. In critical infrastructure or sectors with high reliance on continuous connectivity, such as finance, healthcare, or government services, the impact could be more severe. The absence of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and lack of authentication requirements mean attackers could develop exploits rapidly once the vulnerability is widely known.
Mitigation Recommendations
1. Immediately restrict access to the router’s management interfaces (web UI, SSH, Telnet) to trusted internal networks or VPNs to prevent unauthorized remote exploitation. 2. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 3. Monitor network traffic for unusual or malformed requests targeting the get_parentControl_list_Info function or the 'urls' parameter, using intrusion detection systems (IDS) or firewall logs. 4. Disable or limit parental control features if not required, as the vulnerability is in the parent control list function. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable Tenda AX3 routers with devices from vendors with a stronger security track record if patching is delayed. 7. Educate IT staff and users about the risks of using default or outdated router firmware and the importance of network hygiene. 8. Employ network-level DoS protection mechanisms to mitigate potential denial of service impacts. These steps go beyond generic advice by focusing on network access controls, feature-specific mitigations, and proactive monitoring tailored to this vulnerability’s characteristics.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-63149: n/a
Description
Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the urls parameter of the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-63149 is a stack-based buffer overflow vulnerability identified in the Tenda AX3 router firmware version V16.03.12.10_CN. The vulnerability resides in the get_parentControl_list_Info function, which processes the 'urls' parameter. Due to insufficient bounds checking, an attacker can send a crafted request containing an overly long or malformed 'urls' parameter, triggering a stack overflow. This overflow can overwrite the stack, leading to a crash of the router’s firmware process and causing a Denial of Service (DoS) by making the device unresponsive or rebooting it. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score is 7.5, indicating high severity primarily due to the impact on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). As of the publication date, no patches or known exploits are publicly available. The lack of a patch means affected devices remain vulnerable, posing a risk especially in environments where these routers are deployed without adequate network protections. The Tenda AX3 is a popular consumer-grade Wi-Fi 6 router, often used in small office/home office (SOHO) settings, which may be part of European organizational networks, particularly in SMEs.
Potential Impact
The primary impact of CVE-2025-63149 is on the availability of network infrastructure relying on the Tenda AX3 router. Exploitation results in a Denial of Service, potentially causing network outages or degraded connectivity for users dependent on the affected device. For European organizations, especially small and medium enterprises (SMEs) and home office workers using these routers, this could disrupt business operations, remote work, and communications. The vulnerability does not compromise confidentiality or integrity directly, but the loss of network availability can have cascading effects on productivity and service delivery. Additionally, repeated exploitation attempts could lead to increased operational costs due to troubleshooting and device replacement. In critical infrastructure or sectors with high reliance on continuous connectivity, such as finance, healthcare, or government services, the impact could be more severe. The absence of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and lack of authentication requirements mean attackers could develop exploits rapidly once the vulnerability is widely known.
Mitigation Recommendations
1. Immediately restrict access to the router’s management interfaces (web UI, SSH, Telnet) to trusted internal networks or VPNs to prevent unauthorized remote exploitation. 2. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 3. Monitor network traffic for unusual or malformed requests targeting the get_parentControl_list_Info function or the 'urls' parameter, using intrusion detection systems (IDS) or firewall logs. 4. Disable or limit parental control features if not required, as the vulnerability is in the parent control list function. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable Tenda AX3 routers with devices from vendors with a stronger security track record if patching is delayed. 7. Educate IT staff and users about the risks of using default or outdated router firmware and the importance of network hygiene. 8. Employ network-level DoS protection mechanisms to mitigate potential denial of service impacts. These steps go beyond generic advice by focusing on network access controls, feature-specific mitigations, and proactive monitoring tailored to this vulnerability’s characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69124159941466772c4b1f94
Added to database: 11/10/2025, 7:47:37 PM
Last enriched: 11/17/2025, 8:01:53 PM
Last updated: 12/25/2025, 6:45:12 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15083: On-Chip Debug and Test Interface With Improper Access Control in TOZED ZLT M30s
LowCVE-2025-15082: Information Disclosure in TOZED ZLT M30s
MediumCVE-2025-15081: Command Injection in JD Cloud BE6500
MediumCVE-2025-2406: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Verisay Communication and Information Technology Industry and Trade Ltd. Co. Trizbi
HighCVE-2025-2405: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Verisay Communication and Information Technology Industry and Trade Ltd. Co. Titarus
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.