Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70747: n/a

0
High
VulnerabilityCVE-2025-70747cvecve-2025-70747
Published: Wed Jan 14 2026 (01/14/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the serviceName parameter of the sub_65A28 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 01/14/2026, 18:03:05 UTC

Technical Analysis

CVE-2025-70747 identifies a stack overflow vulnerability in the Tenda AX-1806 router firmware version 1.0.0.1. The flaw exists in the handling of the serviceName parameter within the sub_65A28 function, where improper input validation allows an attacker to overflow the stack memory. This overflow can be triggered by sending a specially crafted request to the device, causing it to crash or reboot, resulting in a Denial of Service (DoS). The vulnerability does not require authentication, meaning an attacker with network access to the device can exploit it remotely. The absence of a CVSS score and patches indicates this is a newly disclosed issue with limited public information and no known active exploitation. The impact is primarily on device availability, potentially disrupting network operations dependent on the affected routers. The Tenda AX-1806 is a consumer-grade router, but it may also be deployed in small to medium enterprise environments or branch offices. The lack of authentication requirement and the straightforward nature of the exploit increase the risk profile. No mitigation patches are currently available, so defensive measures must focus on network controls and monitoring.

Potential Impact

For European organizations, the primary impact of CVE-2025-70747 is the potential disruption of network availability due to router crashes or reboots triggered by the stack overflow. This can lead to loss of connectivity for users and services relying on the affected Tenda AX-1806 devices, impacting business continuity and operational efficiency. Organizations with remote or branch offices using these routers may experience localized outages. Critical infrastructure or services dependent on these devices could face increased risk of downtime. Although no data confidentiality or integrity compromise is indicated, the availability impact alone can have significant operational consequences. The lack of authentication requirement means attackers can exploit the vulnerability from within the network or potentially from the internet if the device is exposed. This elevates the risk for organizations with insufficient network segmentation or exposed management interfaces. The absence of known exploits in the wild currently limits immediate threat, but the vulnerability’s simplicity suggests it could be weaponized quickly once exploit code is developed.

Mitigation Recommendations

1. Immediately restrict access to the Tenda AX-1806 management interfaces by implementing network segmentation and firewall rules to limit access to trusted administrators only. 2. Disable remote management features if not required, especially those accessible from the internet. 3. Monitor network traffic for unusual or malformed requests targeting the serviceName parameter or related router services to detect potential exploitation attempts. 4. Replace or upgrade affected devices to models with updated firmware once patches become available from Tenda. 5. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to identify exploitation attempts targeting this vulnerability. 6. Conduct regular network audits to identify all Tenda AX-1806 devices and assess their exposure. 7. Educate network administrators about the vulnerability and encourage prompt reporting of any device instability or crashes. 8. Use VPNs or secure tunnels for remote access to reduce exposure of management interfaces. These steps go beyond generic advice by focusing on access control, monitoring, and proactive device management specific to this vulnerability and device type.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6967d6fcd0ff220b9516d4a3

Added to database: 1/14/2026, 5:48:44 PM

Last enriched: 1/14/2026, 6:03:05 PM

Last updated: 1/14/2026, 7:34:45 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats