Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71024: n/a

0
High
VulnerabilityCVE-2025-71024cvecve-2025-71024
Published: Tue Jan 13 2026 (01/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the serviceName2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:12:47 UTC

Technical Analysis

CVE-2025-71024 is a stack-based buffer overflow vulnerability identified in the Tenda AX-3 router firmware version 16.03.12.10_CN. The vulnerability resides in the handling of the serviceName2 parameter within the fromAdvSetMacMtuWan function. When this parameter is supplied with a specially crafted input, it causes a stack overflow condition that leads to a denial of service by crashing or rebooting the device. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it accessible to any attacker with network access to the device. The CVSS v3.1 score of 7.5 reflects the high impact on availability (DoS) and the low attack complexity and no privileges required. Although no known public exploits or patches are currently available, the flaw poses a significant risk to network stability for affected users. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and well-understood software weakness. This issue primarily affects the availability of the device, potentially disrupting internet connectivity and network services dependent on the router. The lack of patches necessitates proactive mitigation to reduce exposure.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to denial of service on Tenda AX-3 routers, causing network outages and interruption of critical business services reliant on internet connectivity. This could affect small to medium enterprises and home office environments where such consumer-grade routers are deployed. Disruption of availability can impact productivity, communication, and access to cloud services. In sectors such as finance, healthcare, and manufacturing, even short network downtime can have operational and compliance repercussions. Additionally, widespread exploitation could degrade ISP service quality if many customer premises equipment (CPE) devices are affected. The vulnerability does not expose sensitive data or allow code execution, limiting impact to availability only. However, the ease of remote exploitation without authentication increases the risk of opportunistic attacks, especially in environments with exposed WAN interfaces or weak network segmentation.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Restrict remote access to the router's management interfaces by disabling WAN-side administration or limiting it via firewall rules and VPN access only. 2) Segment the network to isolate critical systems from consumer-grade routers and untrusted networks. 3) Monitor network traffic for unusual or malformed requests targeting the fromAdvSetMacMtuWan function or the serviceName2 parameter patterns. 4) Replace or upgrade affected Tenda AX-3 devices with models that have patched firmware once available. 5) Engage with Tenda support channels to obtain firmware updates or advisories. 6) Educate users and administrators about the risks of exposing router management interfaces to the internet. 7) Employ intrusion detection/prevention systems (IDS/IPS) to detect and block exploit attempts targeting this vulnerability. These targeted actions go beyond generic advice by focusing on access control, monitoring, and device replacement strategies tailored to this specific vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69666b2ea60475309f804a52

Added to database: 1/13/2026, 3:56:30 PM

Last enriched: 1/21/2026, 2:12:47 AM

Last updated: 2/6/2026, 8:44:09 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats