CVE-2025-70753: n/a
CVE-2025-70753 is a stack overflow vulnerability found in the Tenda AX-1806 router firmware version 1. 0. 0. 1, specifically in the handling of the security_5g parameter within the sub_4CA50 function. Exploiting this flaw allows an attacker to cause a Denial of Service (DoS) by sending a crafted request, leading to a crash or reboot of the device. There are no known exploits in the wild currently, and no patch has been published yet. The vulnerability does not require authentication but does require network access to the device's management interface. European organizations using this router model could face network disruptions and potential operational impacts. Mitigation involves restricting access to the router’s management interfaces, monitoring for unusual traffic patterns, and applying firmware updates once available. Countries with higher adoption of Tenda networking equipment and significant reliance on small office/home office (SOHO) routers are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-70753 is a stack overflow vulnerability identified in the Tenda AX-1806 router firmware version 1.0.0.1. The flaw exists in the processing of the security_5g parameter within the sub_4CA50 function, where improper handling of input data leads to a stack overflow condition. This vulnerability can be triggered by sending a specially crafted request to the device, causing it to crash or reboot, resulting in a Denial of Service (DoS). The vulnerability does not require authentication, meaning an attacker with network access to the router’s management interface or exposed services can exploit it. No known exploits have been reported in the wild, and no patches or firmware updates have been released at the time of this report. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed. The stack overflow nature of the vulnerability suggests that it could potentially be leveraged for more severe attacks, such as remote code execution, but currently, only DoS is confirmed. The affected device, Tenda AX-1806, is a consumer-grade Wi-Fi 6 router commonly used in small office and home environments. The vulnerability’s exploitation could disrupt network connectivity, impacting business operations and user productivity.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to temporary loss of network connectivity due to router crashes or reboots, resulting in Denial of Service. This can disrupt critical business operations, especially for small and medium enterprises relying on Tenda AX-1806 routers for internet access and internal networking. The impact on confidentiality and integrity is currently unknown, as no remote code execution or data breach has been reported. However, the availability impact alone can cause significant operational downtime, affecting communication, cloud access, and other network-dependent services. Organizations in sectors with high reliance on continuous connectivity, such as finance, healthcare, and manufacturing, may experience operational delays and potential financial loss. Additionally, the lack of authentication requirement lowers the barrier for attackers, increasing the risk of exploitation in environments where routers are exposed to untrusted networks or the internet. The absence of patches means organizations must rely on network-level mitigations until vendor updates are available.
Mitigation Recommendations
1. Immediately restrict access to the router’s management interfaces by limiting them to trusted internal networks and disabling remote management features if not required. 2. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data. 3. Monitor network traffic for unusual or malformed requests targeting the security_5g parameter or the router’s management interface. 4. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts once signatures become available. 5. Regularly check for firmware updates from Tenda and apply patches promptly when released. 6. Consider replacing vulnerable Tenda AX-1806 routers with alternative devices from vendors with stronger security track records if immediate patching is not feasible. 7. Educate IT staff about this vulnerability and encourage proactive network hygiene and device hardening practices. 8. Maintain backups of router configurations to facilitate rapid recovery after a DoS event.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-70753: n/a
Description
CVE-2025-70753 is a stack overflow vulnerability found in the Tenda AX-1806 router firmware version 1. 0. 0. 1, specifically in the handling of the security_5g parameter within the sub_4CA50 function. Exploiting this flaw allows an attacker to cause a Denial of Service (DoS) by sending a crafted request, leading to a crash or reboot of the device. There are no known exploits in the wild currently, and no patch has been published yet. The vulnerability does not require authentication but does require network access to the device's management interface. European organizations using this router model could face network disruptions and potential operational impacts. Mitigation involves restricting access to the router’s management interfaces, monitoring for unusual traffic patterns, and applying firmware updates once available. Countries with higher adoption of Tenda networking equipment and significant reliance on small office/home office (SOHO) routers are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-70753 is a stack overflow vulnerability identified in the Tenda AX-1806 router firmware version 1.0.0.1. The flaw exists in the processing of the security_5g parameter within the sub_4CA50 function, where improper handling of input data leads to a stack overflow condition. This vulnerability can be triggered by sending a specially crafted request to the device, causing it to crash or reboot, resulting in a Denial of Service (DoS). The vulnerability does not require authentication, meaning an attacker with network access to the router’s management interface or exposed services can exploit it. No known exploits have been reported in the wild, and no patches or firmware updates have been released at the time of this report. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed. The stack overflow nature of the vulnerability suggests that it could potentially be leveraged for more severe attacks, such as remote code execution, but currently, only DoS is confirmed. The affected device, Tenda AX-1806, is a consumer-grade Wi-Fi 6 router commonly used in small office and home environments. The vulnerability’s exploitation could disrupt network connectivity, impacting business operations and user productivity.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to temporary loss of network connectivity due to router crashes or reboots, resulting in Denial of Service. This can disrupt critical business operations, especially for small and medium enterprises relying on Tenda AX-1806 routers for internet access and internal networking. The impact on confidentiality and integrity is currently unknown, as no remote code execution or data breach has been reported. However, the availability impact alone can cause significant operational downtime, affecting communication, cloud access, and other network-dependent services. Organizations in sectors with high reliance on continuous connectivity, such as finance, healthcare, and manufacturing, may experience operational delays and potential financial loss. Additionally, the lack of authentication requirement lowers the barrier for attackers, increasing the risk of exploitation in environments where routers are exposed to untrusted networks or the internet. The absence of patches means organizations must rely on network-level mitigations until vendor updates are available.
Mitigation Recommendations
1. Immediately restrict access to the router’s management interfaces by limiting them to trusted internal networks and disabling remote management features if not required. 2. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data. 3. Monitor network traffic for unusual or malformed requests targeting the security_5g parameter or the router’s management interface. 4. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts once signatures become available. 5. Regularly check for firmware updates from Tenda and apply patches promptly when released. 6. Consider replacing vulnerable Tenda AX-1806 routers with alternative devices from vendors with stronger security track records if immediate patching is not feasible. 7. Educate IT staff about this vulnerability and encourage proactive network hygiene and device hardening practices. 8. Maintain backups of router configurations to facilitate rapid recovery after a DoS event.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69666eb2a60475309f84037f
Added to database: 1/13/2026, 4:11:30 PM
Last enriched: 1/13/2026, 4:25:54 PM
Last updated: 1/13/2026, 6:01:05 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-37166: Vulnerability in Hewlett Packard Enterprise (HPE) Instant On
HighCVE-2025-37165: Vulnerability in Hewlett Packard Enterprise (HPE) Instant On
HighCVE-2025-10865: CWE-416: Use After Free in Imagination Technologies Graphics DDK
HighAfter Goldman, JPMorgan Discloses Law Firm Data Breach
HighCVE-2025-8090: CWE-476 NULL Pointer Dereference in BlackBerry Ltd QNX Software Development Platform
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.