CVE-2025-70646: n/a
Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow in the security parameter of the sub_72290 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-70646 identifies a stack-based buffer overflow vulnerability in the Tenda AX1803 router firmware version 1.0.0.1. The vulnerability resides in the sub_72290 function, specifically in the handling of a security parameter, where improper bounds checking allows an attacker to overflow the stack. This flaw can be triggered remotely by sending a specially crafted network request to the device, causing it to crash and thus resulting in a denial of service (DoS). The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, meaning an attacker can exploit it over the internet or local network. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and the impact on availability, though confidentiality and integrity remain unaffected. No patches or firmware updates have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and well-understood software weakness. Given the nature of the device—a consumer-grade router—this vulnerability could disrupt internet connectivity for users and potentially impact network availability in small business or home office environments where these routers are deployed.
Potential Impact
The primary impact of CVE-2025-70646 is the denial of service caused by the router crashing due to the stack overflow. For European organizations, especially small and medium enterprises (SMEs) and home offices relying on Tenda AX1803 routers, this could lead to loss of internet connectivity, disruption of business operations, and potential downtime. Critical services dependent on continuous network availability could be interrupted, affecting productivity and possibly causing financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can be significant in environments with limited IT support or where these routers serve as the main gateway. Additionally, if exploited at scale, this vulnerability could be leveraged in coordinated attacks to disrupt multiple organizations or residential users simultaneously. The lack of available patches increases the risk window, necessitating immediate mitigation efforts. European sectors with high reliance on consumer-grade networking equipment, such as remote workers, small offices, and certain public institutions, may be disproportionately affected.
Mitigation Recommendations
Since no official patches or firmware updates are currently available for this vulnerability, affected organizations should implement the following mitigations: 1) Immediately isolate Tenda AX1803 routers from untrusted networks, especially the internet, by placing them behind firewalls or network segmentation to limit exposure. 2) Disable any unnecessary remote management features or services on the router to reduce the attack surface. 3) Monitor network traffic for unusual or malformed packets targeting the router to detect potential exploitation attempts. 4) Where feasible, replace Tenda AX1803 devices with alternative routers from vendors with active security support and patch availability. 5) Implement network-level intrusion prevention systems (IPS) that can detect and block exploit attempts targeting this vulnerability. 6) Educate users about the risk and encourage prompt reporting of connectivity issues that may indicate exploitation. 7) Maintain up-to-date network device inventories to quickly identify and remediate vulnerable devices. These steps go beyond generic advice by focusing on network isolation, monitoring, and device replacement strategies tailored to the specific vulnerability and device type.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-70646: n/a
Description
Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow in the security parameter of the sub_72290 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-70646 identifies a stack-based buffer overflow vulnerability in the Tenda AX1803 router firmware version 1.0.0.1. The vulnerability resides in the sub_72290 function, specifically in the handling of a security parameter, where improper bounds checking allows an attacker to overflow the stack. This flaw can be triggered remotely by sending a specially crafted network request to the device, causing it to crash and thus resulting in a denial of service (DoS). The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, meaning an attacker can exploit it over the internet or local network. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and the impact on availability, though confidentiality and integrity remain unaffected. No patches or firmware updates have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and well-understood software weakness. Given the nature of the device—a consumer-grade router—this vulnerability could disrupt internet connectivity for users and potentially impact network availability in small business or home office environments where these routers are deployed.
Potential Impact
The primary impact of CVE-2025-70646 is the denial of service caused by the router crashing due to the stack overflow. For European organizations, especially small and medium enterprises (SMEs) and home offices relying on Tenda AX1803 routers, this could lead to loss of internet connectivity, disruption of business operations, and potential downtime. Critical services dependent on continuous network availability could be interrupted, affecting productivity and possibly causing financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can be significant in environments with limited IT support or where these routers serve as the main gateway. Additionally, if exploited at scale, this vulnerability could be leveraged in coordinated attacks to disrupt multiple organizations or residential users simultaneously. The lack of available patches increases the risk window, necessitating immediate mitigation efforts. European sectors with high reliance on consumer-grade networking equipment, such as remote workers, small offices, and certain public institutions, may be disproportionately affected.
Mitigation Recommendations
Since no official patches or firmware updates are currently available for this vulnerability, affected organizations should implement the following mitigations: 1) Immediately isolate Tenda AX1803 routers from untrusted networks, especially the internet, by placing them behind firewalls or network segmentation to limit exposure. 2) Disable any unnecessary remote management features or services on the router to reduce the attack surface. 3) Monitor network traffic for unusual or malformed packets targeting the router to detect potential exploitation attempts. 4) Where feasible, replace Tenda AX1803 devices with alternative routers from vendors with active security support and patch availability. 5) Implement network-level intrusion prevention systems (IPS) that can detect and block exploit attempts targeting this vulnerability. 6) Educate users about the risk and encourage prompt reporting of connectivity issues that may indicate exploitation. 7) Maintain up-to-date network device inventories to quickly identify and remediate vulnerable devices. These steps go beyond generic advice by focusing on network isolation, monitoring, and device replacement strategies tailored to the specific vulnerability and device type.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6971006e4623b1157cd9ee53
Added to database: 1/21/2026, 4:35:58 PM
Last enriched: 1/28/2026, 8:07:14 PM
Last updated: 2/5/2026, 4:26:44 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68722: n/a
UnknownCVE-2025-68721: n/a
UnknownCVE-2025-14150: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM webMethods Integration (on prem) - Integration Server
MediumCVE-2025-13491: CWE-426 Untrusted Search Path in IBM App Connect Operator
MediumCVE-2026-1927: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.