CVE-2025-70645: n/a
Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetWifiMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-70645 identifies a stack overflow vulnerability in the Tenda AX-1806 router firmware version 1.0.0.1. The flaw resides in the handling of the deviceList parameter within the formSetWifiMacFilterCfg function, which is responsible for configuring MAC address filtering on the Wi-Fi interface. A crafted request manipulating this parameter can overflow the stack, causing the device to crash or reboot, resulting in a Denial of Service (DoS). This vulnerability does not require authentication or user interaction, increasing its risk profile, especially if the router's management interface is exposed to untrusted networks. Although no exploits have been observed in the wild, the vulnerability's presence in consumer-grade networking equipment used in SOHO environments raises concerns about potential disruption. The absence of a CVSS score limits precise severity quantification, but the technical characteristics suggest a significant impact on device availability. No patches or firmware updates are currently listed, emphasizing the need for proactive defensive measures. The vulnerability highlights the importance of secure coding practices in embedded device firmware and the risks posed by insufficient input validation in network device management functions.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home offices relying on Tenda AX-1806 routers, this vulnerability could lead to network outages due to device crashes or reboots triggered by malicious actors. Such Denial of Service conditions can disrupt internet connectivity, internal communications, and access to cloud services, potentially halting business operations. The impact extends to availability but does not directly compromise confidentiality or integrity. However, prolonged or repeated outages could indirectly affect data availability and business continuity. Organizations with remote or distributed workforces using vulnerable routers may experience increased operational risk. Additionally, critical infrastructure or service providers using these devices in edge or access networks could face service degradation. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks once exploit code becomes available. The vulnerability's ease of exploitation without authentication increases its threat level in exposed network environments.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management where possible. 2. Monitor network traffic for unusual or malformed requests targeting the formSetWifiMacFilterCfg function or the deviceList parameter to detect potential exploitation attempts. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Regularly check for firmware updates from Tenda and apply patches promptly once available to remediate the vulnerability. 5. Consider replacing vulnerable Tenda AX-1806 routers with devices from vendors with a strong security update track record if patching is delayed. 6. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong access controls. 7. Employ intrusion detection/prevention systems (IDS/IPS) capable of identifying exploit attempts targeting this vulnerability. 8. Maintain comprehensive network and device logs to support incident response and forensic analysis if exploitation is suspected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-70645: n/a
Description
Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetWifiMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-70645 identifies a stack overflow vulnerability in the Tenda AX-1806 router firmware version 1.0.0.1. The flaw resides in the handling of the deviceList parameter within the formSetWifiMacFilterCfg function, which is responsible for configuring MAC address filtering on the Wi-Fi interface. A crafted request manipulating this parameter can overflow the stack, causing the device to crash or reboot, resulting in a Denial of Service (DoS). This vulnerability does not require authentication or user interaction, increasing its risk profile, especially if the router's management interface is exposed to untrusted networks. Although no exploits have been observed in the wild, the vulnerability's presence in consumer-grade networking equipment used in SOHO environments raises concerns about potential disruption. The absence of a CVSS score limits precise severity quantification, but the technical characteristics suggest a significant impact on device availability. No patches or firmware updates are currently listed, emphasizing the need for proactive defensive measures. The vulnerability highlights the importance of secure coding practices in embedded device firmware and the risks posed by insufficient input validation in network device management functions.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home offices relying on Tenda AX-1806 routers, this vulnerability could lead to network outages due to device crashes or reboots triggered by malicious actors. Such Denial of Service conditions can disrupt internet connectivity, internal communications, and access to cloud services, potentially halting business operations. The impact extends to availability but does not directly compromise confidentiality or integrity. However, prolonged or repeated outages could indirectly affect data availability and business continuity. Organizations with remote or distributed workforces using vulnerable routers may experience increased operational risk. Additionally, critical infrastructure or service providers using these devices in edge or access networks could face service degradation. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks once exploit code becomes available. The vulnerability's ease of exploitation without authentication increases its threat level in exposed network environments.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management where possible. 2. Monitor network traffic for unusual or malformed requests targeting the formSetWifiMacFilterCfg function or the deviceList parameter to detect potential exploitation attempts. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Regularly check for firmware updates from Tenda and apply patches promptly once available to remediate the vulnerability. 5. Consider replacing vulnerable Tenda AX-1806 routers with devices from vendors with a strong security update track record if patching is delayed. 6. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong access controls. 7. Employ intrusion detection/prevention systems (IDS/IPS) capable of identifying exploit attempts targeting this vulnerability. 8. Maintain comprehensive network and device logs to support incident response and forensic analysis if exploitation is suspected.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6970f5e14623b1157cd6df2a
Added to database: 1/21/2026, 3:50:57 PM
Last enriched: 1/21/2026, 4:05:17 PM
Last updated: 2/7/2026, 6:09:32 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2026-2075: Improper Access Controls in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.