Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70645: n/a

0
High
VulnerabilityCVE-2025-70645cvecve-2025-70645
Published: Wed Jan 21 2026 (01/21/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetWifiMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 01/21/2026, 16:05:17 UTC

Technical Analysis

CVE-2025-70645 identifies a stack overflow vulnerability in the Tenda AX-1806 router firmware version 1.0.0.1. The flaw resides in the handling of the deviceList parameter within the formSetWifiMacFilterCfg function, which is responsible for configuring MAC address filtering on the Wi-Fi interface. A crafted request manipulating this parameter can overflow the stack, causing the device to crash or reboot, resulting in a Denial of Service (DoS). This vulnerability does not require authentication or user interaction, increasing its risk profile, especially if the router's management interface is exposed to untrusted networks. Although no exploits have been observed in the wild, the vulnerability's presence in consumer-grade networking equipment used in SOHO environments raises concerns about potential disruption. The absence of a CVSS score limits precise severity quantification, but the technical characteristics suggest a significant impact on device availability. No patches or firmware updates are currently listed, emphasizing the need for proactive defensive measures. The vulnerability highlights the importance of secure coding practices in embedded device firmware and the risks posed by insufficient input validation in network device management functions.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home offices relying on Tenda AX-1806 routers, this vulnerability could lead to network outages due to device crashes or reboots triggered by malicious actors. Such Denial of Service conditions can disrupt internet connectivity, internal communications, and access to cloud services, potentially halting business operations. The impact extends to availability but does not directly compromise confidentiality or integrity. However, prolonged or repeated outages could indirectly affect data availability and business continuity. Organizations with remote or distributed workforces using vulnerable routers may experience increased operational risk. Additionally, critical infrastructure or service providers using these devices in edge or access networks could face service degradation. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks once exploit code becomes available. The vulnerability's ease of exploitation without authentication increases its threat level in exposed network environments.

Mitigation Recommendations

1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management where possible. 2. Monitor network traffic for unusual or malformed requests targeting the formSetWifiMacFilterCfg function or the deviceList parameter to detect potential exploitation attempts. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Regularly check for firmware updates from Tenda and apply patches promptly once available to remediate the vulnerability. 5. Consider replacing vulnerable Tenda AX-1806 routers with devices from vendors with a strong security update track record if patching is delayed. 6. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong access controls. 7. Employ intrusion detection/prevention systems (IDS/IPS) capable of identifying exploit attempts targeting this vulnerability. 8. Maintain comprehensive network and device logs to support incident response and forensic analysis if exploitation is suspected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6970f5e14623b1157cd6df2a

Added to database: 1/21/2026, 3:50:57 PM

Last enriched: 1/21/2026, 4:05:17 PM

Last updated: 2/7/2026, 6:09:32 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats