Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70650: n/a

0
High
VulnerabilityCVE-2025-70650cvecve-2025-70650
Published: Wed Jan 21 2026 (01/21/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 01/21/2026, 15:35:49 UTC

Technical Analysis

CVE-2025-70650 is a stack overflow vulnerability identified in the Tenda AX-1806 router firmware version 1.0.0.1. The flaw resides in the formSetMacFilterCfg function, specifically within the deviceList parameter, which is improperly handled, allowing a crafted request to overflow the stack. This overflow can cause the device to crash or reboot, resulting in a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction, implying that an attacker could exploit it remotely if they can reach the router's management interface or any exposed service handling this function. The absence of a CVSS score and patches suggests this is a newly disclosed issue with limited public information and no known active exploitation. The impact is primarily on availability, as the router becomes unresponsive or unstable. Tenda AX-1806 routers are typically used in home and small office environments, but their compromise can disrupt network connectivity and potentially affect dependent services. The lack of known exploits provides a window for mitigation before widespread attacks occur. However, the vulnerability's presence in a network edge device makes it a significant risk vector for network disruption.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to network outages due to router crashes, impacting business continuity and productivity. Small and medium enterprises (SMEs) and home office setups using Tenda AX-1806 routers are particularly vulnerable, as these devices often lack advanced security controls and monitoring. Disruptions could affect remote work capabilities, VoIP communications, and access to cloud services. Critical infrastructure sectors relying on these routers for network access could face operational interruptions. The denial of service could also be leveraged as part of a larger attack chain to distract or delay incident response. While confidentiality and integrity impacts are not indicated, the availability impact alone can have significant operational consequences. The absence of patches increases the risk window, emphasizing the need for proactive defense measures. European organizations with limited IT security resources may be disproportionately affected due to the device's common use in less managed environments.

Mitigation Recommendations

1. Immediately restrict access to the router's management interface by limiting it to trusted internal IP addresses and disabling remote management where possible. 2. Implement network segmentation to isolate vulnerable devices from critical network segments and sensitive data. 3. Monitor network traffic for unusual requests targeting the deviceList parameter or abnormal router behavior indicating potential exploitation attempts. 4. Replace or upgrade Tenda AX-1806 routers with models from vendors providing timely security updates and patches. 5. If replacement is not feasible, consider deploying firewall rules to block malformed packets or requests that could trigger the overflow. 6. Educate users and administrators about the vulnerability and encourage vigilance for signs of network instability. 7. Engage with Tenda support channels to obtain information on forthcoming patches or firmware updates addressing this issue. 8. Maintain up-to-date network device inventories to quickly identify and remediate affected devices. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6970eedc4623b1157cd51a79

Added to database: 1/21/2026, 3:21:00 PM

Last enriched: 1/21/2026, 3:35:49 PM

Last updated: 2/7/2026, 3:54:26 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats