Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65804: n/a

0
Medium
VulnerabilityCVE-2025-65804cvecve-2025-65804
Published: Mon Dec 08 2025 (12/08/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX3 v16.03.12.11 contains a stack overflow in formSetIptv via the iptvType parameter, which can cause memory corruption and enable remote code execution (RCE).

AI-Powered Analysis

AILast updated: 12/08/2025, 17:46:21 UTC

Technical Analysis

CVE-2025-65804 is a stack overflow vulnerability found in the Tenda AX3 router firmware version 16.03.12.11. The vulnerability resides in the formSetIptv function, which processes the iptvType parameter. Improper handling of this parameter leads to a stack overflow condition, causing memory corruption. This memory corruption can be leveraged by an attacker to execute arbitrary code remotely on the router. The vulnerability does not require authentication, meaning an attacker can exploit it remotely without prior access to the device. The lack of a CVSS score and absence of known exploits in the wild suggest this is a newly disclosed vulnerability, but the technical details indicate a critical risk due to the potential for remote code execution. The affected device, Tenda AX3, is a widely used consumer and small business router, often deployed in home and office networks. Exploitation could allow attackers to take full control of the device, intercept or manipulate network traffic, and pivot to internal networks. The vulnerability’s exploitation vector is through the IPTV configuration interface, which may be exposed on the local network or potentially remotely if remote management is enabled. No patches or mitigations have been officially published at the time of disclosure, increasing the urgency for users to apply vendor updates once available or implement interim protective measures.

Potential Impact

For European organizations, this vulnerability could have severe consequences. Compromise of Tenda AX3 routers could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of network services. Small and medium enterprises, as well as home office setups relying on these routers, are particularly vulnerable due to typically weaker network defenses. The ability to execute code remotely without authentication increases the risk of widespread exploitation, potentially enabling attackers to establish persistent footholds or launch further attacks such as data exfiltration or ransomware deployment. Critical infrastructure sectors that use these routers for IPTV or network connectivity could face operational disruptions. Additionally, the privacy of end-users could be compromised, affecting compliance with GDPR and other data protection regulations. The absence of known exploits currently provides a window for proactive defense, but the threat landscape could rapidly evolve once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately inventory their network devices to identify any Tenda AX3 routers running firmware version 16.03.12.11. Until an official patch is released, organizations should disable IPTV features if not required, as this reduces the attack surface. Network segmentation should be implemented to isolate vulnerable routers from critical systems and sensitive data. Remote management interfaces should be disabled or restricted to trusted IP addresses only. Intrusion detection and prevention systems should be configured to monitor for anomalous traffic patterns targeting the IPTV configuration interface. Regular firmware updates should be applied promptly once patches become available from Tenda. Additionally, organizations should educate users about the risks and encourage reporting of unusual network behavior. Employing network-level firewall rules to block unsolicited inbound traffic to router management ports can further reduce exposure. Finally, consider replacing vulnerable devices with models that have a stronger security track record if immediate patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69370e8e06c06374c7f3930f

Added to database: 12/8/2025, 5:44:46 PM

Last enriched: 12/8/2025, 5:46:21 PM

Last updated: 12/8/2025, 6:45:49 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats