CVE-2025-63152: n/a
Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the wpapsk_crypto parameter of the wlSetExternParameter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-63152 is a stack-based buffer overflow vulnerability identified in the Tenda AX3 router firmware version V16.03.12.10_CN. The vulnerability resides in the handling of the wpapsk_crypto parameter within the wlSetExternParameter function. This function improperly processes crafted input, leading to a stack overflow condition. Exploiting this flaw requires no authentication or user interaction and can be performed remotely over the network. The consequence of successful exploitation is a Denial of Service (DoS), where the router crashes or becomes unresponsive, disrupting network connectivity. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and critical software weakness. Although no public exploits have been reported yet, the vulnerability's characteristics—remote, unauthenticated, no user interaction—make it a significant risk. No patches or firmware updates have been released at the time of disclosure, increasing the urgency for affected users to implement interim mitigations. The CVSS v3.1 base score of 7.5 reflects the high impact on availability and ease of exploitation. This vulnerability does not affect confidentiality or integrity but can severely impact network operations reliant on the affected devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-63152 is the potential loss of network availability due to router crashes caused by the stack overflow. This can disrupt business operations, especially for small and medium enterprises (SMEs) or remote offices relying on Tenda AX3 routers for internet connectivity and internal network access. Critical services dependent on continuous network uptime, such as VoIP, cloud applications, and remote work infrastructure, may be interrupted. Although the vulnerability does not compromise data confidentiality or integrity, the resulting DoS can lead to operational downtime and potential financial losses. Additionally, repeated exploitation attempts could increase network instability and complicate incident response efforts. The lack of available patches means organizations must rely on network-level controls and monitoring to mitigate risk temporarily. The threat is more pronounced in environments where Tenda AX3 routers are widely deployed without robust network segmentation or intrusion detection capabilities.
Mitigation Recommendations
1. Monitor Tenda’s official channels closely for firmware updates addressing CVE-2025-63152 and apply patches immediately upon release. 2. Implement network segmentation to isolate Tenda AX3 routers from critical infrastructure and sensitive systems, limiting the blast radius of a potential DoS. 3. Deploy network intrusion detection and prevention systems (IDS/IPS) capable of detecting anomalous or malformed packets targeting the wpapsk_crypto parameter or related router management interfaces. 4. Restrict remote management access to the routers by disabling WAN-side management or limiting access to trusted IP addresses only. 5. Regularly audit and inventory network devices to identify the presence of Tenda AX3 routers and assess exposure. 6. Consider temporary replacement or upgrade of vulnerable devices in high-risk environments until patches are available. 7. Educate IT staff about the vulnerability and signs of exploitation to enable rapid detection and response. 8. Employ rate limiting or firewall rules to mitigate the impact of repeated crafted requests targeting the vulnerable parameter.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-63152: n/a
Description
Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the wpapsk_crypto parameter of the wlSetExternParameter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-63152 is a stack-based buffer overflow vulnerability identified in the Tenda AX3 router firmware version V16.03.12.10_CN. The vulnerability resides in the handling of the wpapsk_crypto parameter within the wlSetExternParameter function. This function improperly processes crafted input, leading to a stack overflow condition. Exploiting this flaw requires no authentication or user interaction and can be performed remotely over the network. The consequence of successful exploitation is a Denial of Service (DoS), where the router crashes or becomes unresponsive, disrupting network connectivity. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and critical software weakness. Although no public exploits have been reported yet, the vulnerability's characteristics—remote, unauthenticated, no user interaction—make it a significant risk. No patches or firmware updates have been released at the time of disclosure, increasing the urgency for affected users to implement interim mitigations. The CVSS v3.1 base score of 7.5 reflects the high impact on availability and ease of exploitation. This vulnerability does not affect confidentiality or integrity but can severely impact network operations reliant on the affected devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-63152 is the potential loss of network availability due to router crashes caused by the stack overflow. This can disrupt business operations, especially for small and medium enterprises (SMEs) or remote offices relying on Tenda AX3 routers for internet connectivity and internal network access. Critical services dependent on continuous network uptime, such as VoIP, cloud applications, and remote work infrastructure, may be interrupted. Although the vulnerability does not compromise data confidentiality or integrity, the resulting DoS can lead to operational downtime and potential financial losses. Additionally, repeated exploitation attempts could increase network instability and complicate incident response efforts. The lack of available patches means organizations must rely on network-level controls and monitoring to mitigate risk temporarily. The threat is more pronounced in environments where Tenda AX3 routers are widely deployed without robust network segmentation or intrusion detection capabilities.
Mitigation Recommendations
1. Monitor Tenda’s official channels closely for firmware updates addressing CVE-2025-63152 and apply patches immediately upon release. 2. Implement network segmentation to isolate Tenda AX3 routers from critical infrastructure and sensitive systems, limiting the blast radius of a potential DoS. 3. Deploy network intrusion detection and prevention systems (IDS/IPS) capable of detecting anomalous or malformed packets targeting the wpapsk_crypto parameter or related router management interfaces. 4. Restrict remote management access to the routers by disabling WAN-side management or limiting access to trusted IP addresses only. 5. Regularly audit and inventory network devices to identify the presence of Tenda AX3 routers and assess exposure. 6. Consider temporary replacement or upgrade of vulnerable devices in high-risk environments until patches are available. 7. Educate IT staff about the vulnerability and signs of exploitation to enable rapid detection and response. 8. Employ rate limiting or firewall rules to mitigate the impact of repeated crafted requests targeting the vulnerable parameter.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69120ff3d84bdc1ba68e99c8
Added to database: 11/10/2025, 4:16:51 PM
Last enriched: 11/17/2025, 5:20:15 PM
Last updated: 11/21/2025, 7:25:19 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62608: CWE-122: Heap-based Buffer Overflow in ml-explore mlx
MediumCVE-2025-62609: CWE-476: NULL Pointer Dereference in ml-explore mlx
MediumCVE-2025-48502: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in AMD AMD μProf
MediumCVE-2025-64767: CWE-323: Reusing a Nonce, Key Pair in Encryption in dajiaji hpke-js
CriticalCVE-2025-29934: CWE-459 Incomplete Cleanup in AMD AMD EPYC™ 9004 Series Processors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.