CVE-2025-63457: n/a
Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the wanMTU parameter in the sub_4F55C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-63457 is a stack-based buffer overflow vulnerability identified in the Tenda AX-1803 router firmware version 1.0.0.1. The flaw resides in the handling of the wanMTU parameter within the sub_4F55C function, where improper bounds checking allows an attacker to overflow the stack. This vulnerability can be triggered remotely by sending a specially crafted request to the device's WAN interface, without requiring any authentication or user interaction. Successful exploitation results in a Denial of Service (DoS) condition, typically causing the router to crash or reboot, thereby disrupting network availability. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with the vector indicating an attack vector over the network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H). No patches or official fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability primarily threatens network availability, which could impact business continuity and critical services relying on the affected routers. Given the widespread use of Tenda routers in small to medium enterprises and home networks, the vulnerability poses a tangible risk if exploited by attackers targeting network infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2025-63457 is the potential disruption of network connectivity due to router crashes or reboots caused by the stack overflow. This can lead to temporary loss of internet access, interruption of business operations, and degraded performance of dependent services. Critical sectors such as healthcare, finance, and government that rely on stable network infrastructure could face operational challenges and potential safety risks. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability interruptions can still cause significant operational and reputational damage. Organizations with remote or branch offices using Tenda AX-1803 routers are particularly vulnerable to targeted DoS attacks. Additionally, the vulnerability could be leveraged as part of a larger attack campaign to cause widespread network outages or to distract from other malicious activities. The absence of known exploits in the wild currently limits immediate risk, but the medium severity score and ease of exploitation warrant proactive mitigation.
Mitigation Recommendations
1. Immediately isolate Tenda AX-1803 routers from direct WAN exposure by placing them behind firewalls or VPN gateways to restrict unsolicited inbound traffic targeting the wanMTU parameter. 2. Implement strict network segmentation to limit the impact of any potential DoS attack on critical systems. 3. Monitor network traffic for anomalous or malformed requests directed at the router’s WAN interface, especially those attempting to manipulate MTU settings. 4. Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available; prioritize testing and deployment of these updates. 5. Consider replacing vulnerable devices with alternative routers that have verified security postures if patching is delayed. 6. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting buffer overflow attack patterns targeting network devices. 7. Maintain up-to-date network device inventories to quickly identify and remediate affected hardware. 8. Educate IT staff on the specific nature of this vulnerability to enhance incident response readiness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-63457: n/a
Description
Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the wanMTU parameter in the sub_4F55C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-63457 is a stack-based buffer overflow vulnerability identified in the Tenda AX-1803 router firmware version 1.0.0.1. The flaw resides in the handling of the wanMTU parameter within the sub_4F55C function, where improper bounds checking allows an attacker to overflow the stack. This vulnerability can be triggered remotely by sending a specially crafted request to the device's WAN interface, without requiring any authentication or user interaction. Successful exploitation results in a Denial of Service (DoS) condition, typically causing the router to crash or reboot, thereby disrupting network availability. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with the vector indicating an attack vector over the network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H). No patches or official fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability primarily threatens network availability, which could impact business continuity and critical services relying on the affected routers. Given the widespread use of Tenda routers in small to medium enterprises and home networks, the vulnerability poses a tangible risk if exploited by attackers targeting network infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2025-63457 is the potential disruption of network connectivity due to router crashes or reboots caused by the stack overflow. This can lead to temporary loss of internet access, interruption of business operations, and degraded performance of dependent services. Critical sectors such as healthcare, finance, and government that rely on stable network infrastructure could face operational challenges and potential safety risks. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability interruptions can still cause significant operational and reputational damage. Organizations with remote or branch offices using Tenda AX-1803 routers are particularly vulnerable to targeted DoS attacks. Additionally, the vulnerability could be leveraged as part of a larger attack campaign to cause widespread network outages or to distract from other malicious activities. The absence of known exploits in the wild currently limits immediate risk, but the medium severity score and ease of exploitation warrant proactive mitigation.
Mitigation Recommendations
1. Immediately isolate Tenda AX-1803 routers from direct WAN exposure by placing them behind firewalls or VPN gateways to restrict unsolicited inbound traffic targeting the wanMTU parameter. 2. Implement strict network segmentation to limit the impact of any potential DoS attack on critical systems. 3. Monitor network traffic for anomalous or malformed requests directed at the router’s WAN interface, especially those attempting to manipulate MTU settings. 4. Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available; prioritize testing and deployment of these updates. 5. Consider replacing vulnerable devices with alternative routers that have verified security postures if patching is delayed. 6. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting buffer overflow attack patterns targeting network devices. 7. Maintain up-to-date network device inventories to quickly identify and remediate affected hardware. 8. Educate IT staff on the specific nature of this vulnerability to enhance incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69121361d84bdc1ba6926f54
Added to database: 11/10/2025, 4:31:29 PM
Last enriched: 11/18/2025, 5:28:13 PM
Last updated: 1/7/2026, 4:17:13 AM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.