Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69765: n/a

0
High
VulnerabilityCVE-2025-69765cvecve-2025-69765
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formGetIptv function and the list parameter, which can cause memory corruption and enable remote code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 19:43:36 UTC

Technical Analysis

CVE-2025-69765 is a stack-based buffer overflow vulnerability identified in the Tenda AX3 router firmware version 16.03.12.11. The vulnerability resides in the formGetIptv function, specifically in the handling of the 'list' parameter. Improper bounds checking or validation of this parameter allows an attacker to overflow the stack, causing memory corruption. This memory corruption can be leveraged to execute arbitrary code remotely on the affected device without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and critical software weakness. Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be exploited by attackers to gain control over the router, potentially allowing them to manipulate network traffic, disrupt services, or use the device as a foothold for further attacks. The CVSS score of 7.5 reflects a high severity primarily due to the network attack vector, low attack complexity, and the absence of required privileges or user interaction. The lack of available patches at the time of reporting increases the urgency for mitigation through alternative means until vendor updates are released.

Potential Impact

The exploitation of this vulnerability could have significant consequences for organizations and individuals relying on Tenda AX3 routers. Remote code execution on these devices can lead to complete compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches or man-in-the-middle attacks. The availability of the network could also be impacted, causing denial of service conditions that disrupt business operations or home internet connectivity. For enterprises using these routers in branch offices or remote locations, this could expose sensitive internal networks to external attackers. Additionally, compromised routers can be enlisted into botnets, amplifying large-scale attacks such as distributed denial of service (DDoS). The absence of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of widespread attacks once exploit code becomes available.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level controls such as isolating Tenda AX3 devices from critical network segments and restricting inbound access to router management interfaces from untrusted networks. 2. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection rules targeting malformed packets or unusual traffic patterns related to IPTV or router management protocols. 3. Monitor network traffic for signs of exploitation attempts, including unexpected payloads targeting the formGetIptv function or abnormal device behavior. 4. Encourage users and administrators to disable IPTV features if not required, reducing the attack surface. 5. Maintain strict network segmentation and apply firewall rules to limit exposure of vulnerable devices. 6. Coordinate with Tenda for timely firmware updates and apply patches as soon as they become available. 7. Educate users on the risks of using default or weak credentials and enforce strong authentication practices for device management. 8. Consider deploying network access control (NAC) to ensure only authorized devices connect to sensitive networks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a71f08d1a09e29cb64f6f1

Added to database: 3/3/2026, 5:48:56 PM

Last enriched: 3/10/2026, 7:43:36 PM

Last updated: 4/17/2026, 7:18:43 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses