Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69762: n/a

0
Critical
VulnerabilityCVE-2025-69762cvecve-2025-69762
Published: Wed Jan 21 2026 (01/21/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formSetIptv via the list parameter, which can cause memory corruption and enable remote code execution.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:06:19 UTC

Technical Analysis

CVE-2025-69762 identifies a critical stack-based buffer overflow vulnerability in the Tenda AX3 router firmware version 16.03.12.11. The vulnerability resides in the formSetIptv function, which improperly handles the 'list' parameter, allowing an attacker to overflow the stack. This memory corruption can be exploited remotely without any authentication or user interaction, enabling arbitrary code execution on the device. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and dangerous flaw that can lead to full system compromise. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of remote exploitation (network attack vector, no privileges or user interaction required). Although no exploits have been observed in the wild yet and no official patches have been published, the risk is significant due to the critical nature of the flaw and the widespread use of Tenda AX3 routers in home and small business environments. Attackers could leverage this vulnerability to gain persistent control over affected devices, potentially pivoting into internal networks or disrupting network services. The lack of patches necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

For European organizations, this vulnerability poses a severe threat, especially for those relying on Tenda AX3 routers in their network infrastructure. Successful exploitation could lead to complete compromise of the router, allowing attackers to intercept, modify, or disrupt network traffic, exfiltrate sensitive data, or launch further attacks within the internal network. This could impact confidentiality by exposing private communications, integrity by altering data flows, and availability by causing device crashes or denial of service. Critical sectors such as finance, healthcare, government, and telecommunications could face operational disruptions and data breaches. The vulnerability's remote and unauthenticated nature increases the risk of widespread exploitation, particularly if routers are accessible from the internet or poorly segmented networks. The absence of patches further exacerbates the threat, making proactive defenses essential to prevent exploitation and limit potential damage.

Mitigation Recommendations

European organizations should immediately audit their networks to identify Tenda AX3 routers running firmware version 16.03.12.11. Since no patches are currently available, organizations should implement network segmentation to isolate vulnerable devices from critical systems and restrict access to router management interfaces, preferably limiting them to trusted internal networks. Disable the IPTV feature or the formSetIptv functionality if not required, reducing the attack surface. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous traffic patterns targeting the router's management or IPTV interfaces. Regularly update router firmware when vendors release patches and subscribe to vendor advisories for timely updates. Additionally, consider replacing vulnerable devices with models from vendors with stronger security track records if immediate patching is not feasible. Conduct user awareness training to recognize signs of network compromise and establish incident response plans tailored to network device breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697112004623b1157ce0cb16

Added to database: 1/21/2026, 5:50:56 PM

Last enriched: 1/28/2026, 8:06:19 PM

Last updated: 2/7/2026, 8:01:38 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats