Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71027: n/a

0
Unknown
VulnerabilityCVE-2025-71027cvecve-2025-71027
Published: Tue Jan 13 2026 (01/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wanMTU2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 01/13/2026, 16:10:51 UTC

Technical Analysis

CVE-2025-71027 is a stack overflow vulnerability identified in the Tenda AX-3 router firmware version v16.03.12.10_CN. The flaw exists in the handling of the wanMTU2 parameter within the fromAdvSetMacMtuWan function. A stack overflow occurs when this parameter is manipulated with a crafted request, leading to memory corruption that can crash the device or disrupt its normal operation. This results in a Denial of Service (DoS) condition, rendering the router unavailable to legitimate users. The vulnerability does not require authentication or user interaction, which means an attacker can exploit it remotely by sending malicious packets to the router’s management interface or WAN side if exposed. No CVSS score has been assigned yet, and no public exploits have been reported, but the nature of the vulnerability suggests it could be leveraged to disrupt network connectivity. The affected device, Tenda AX-3, is a popular consumer and small business router model, often deployed in home and small office environments. The lack of a patch or mitigation details at this time increases the urgency for affected users to restrict access and monitor for updates.

Potential Impact

For European organizations, the primary impact of CVE-2025-71027 is on network availability. A successful exploit can cause routers to crash or become unresponsive, leading to loss of internet connectivity and disruption of business operations, especially for small and medium enterprises relying on Tenda AX-3 devices. This could affect remote work, cloud service access, and internal communications. While the vulnerability does not directly compromise confidentiality or integrity, the resulting DoS could be leveraged as part of a larger attack chain or to distract security teams. The impact is more pronounced in environments where these routers are used as primary gateways without redundant failover. Additionally, service providers or managed security service providers (MSSPs) that deploy Tenda AX-3 routers for clients could face broader service disruptions.

Mitigation Recommendations

1. Immediately restrict external access to the router’s management interfaces, especially from the WAN side, to prevent remote exploitation. 2. Implement network segmentation to isolate vulnerable devices from critical infrastructure. 3. Monitor network traffic for unusual or malformed packets targeting the wanMTU2 parameter or related router functions. 4. Regularly check Tenda’s official channels for firmware updates or security advisories addressing this vulnerability and apply patches promptly once available. 5. Consider replacing Tenda AX-3 routers with alternative devices from vendors with a stronger security track record if patching is delayed. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 7. Educate IT staff about this vulnerability to ensure rapid response to any signs of exploitation or device instability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69666b2ea60475309f804a5b

Added to database: 1/13/2026, 3:56:30 PM

Last enriched: 1/13/2026, 4:10:51 PM

Last updated: 1/14/2026, 4:57:56 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats