Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71027: n/a

0
High
VulnerabilityCVE-2025-71027cvecve-2025-71027
Published: Tue Jan 13 2026 (01/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wanMTU2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:13:21 UTC

Technical Analysis

CVE-2025-71027 identifies a stack overflow vulnerability in the Tenda AX-3 router firmware version 16.03.12.10_CN, specifically within the wanMTU2 parameter processed by the fromAdvSetMacMtuWan function. This vulnerability arises from improper handling of input data leading to a stack-based buffer overflow (CWE-121). An attacker can send a specially crafted request targeting the wanMTU2 parameter, triggering the overflow and causing the router to crash or reboot, resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to availability disruption; confidentiality and integrity are not affected. Although no exploits have been observed in the wild and no official patches have been released, the high CVSS score (7.5) reflects the ease of exploitation and significant potential for service interruption. The affected product, Tenda AX-3, is a consumer-grade Wi-Fi 6 router widely used in various regions, including parts of Europe. The lack of patches and public exploit code necessitates proactive defensive measures to mitigate potential attacks.

Potential Impact

For European organizations, the primary impact of CVE-2025-71027 is the potential for network outages caused by denial of service attacks on Tenda AX-3 routers. This can disrupt internet connectivity, impair business operations, and affect services reliant on continuous network availability. Organizations using these routers in critical infrastructure, small to medium enterprises, or home office environments may experience operational downtime. The vulnerability does not compromise data confidentiality or integrity but can degrade service reliability. Given the remote and unauthenticated nature of the exploit, attackers can target exposed WAN interfaces from anywhere, increasing the risk of widespread disruption. The absence of known exploits in the wild currently limits immediate risk, but the availability of technical details may facilitate future exploit development. European entities with limited IT security resources or those that have not segmented their networks may be particularly vulnerable to cascading effects from router outages.

Mitigation Recommendations

1. Immediately restrict WAN-side access to router management interfaces to prevent remote exploitation. 2. Implement network segmentation to isolate critical systems from consumer-grade routers like the Tenda AX-3. 3. Monitor network traffic for unusual or malformed packets targeting the wanMTU2 parameter or related management functions. 4. Disable remote management features on affected routers if not strictly necessary. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable Tenda AX-3 devices with routers from vendors with stronger security track records if patching is delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting attempts to exploit stack overflow patterns. 8. Educate IT staff about this vulnerability to ensure rapid response to any signs of exploitation or service disruption.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69666b2ea60475309f804a5b

Added to database: 1/13/2026, 3:56:30 PM

Last enriched: 1/21/2026, 2:13:21 AM

Last updated: 2/7/2026, 6:36:54 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats