Cyber Posture

CVE-2025-69762

CriticalPublic PoC

Published: 21 January 2026

Published
21 January 2026
Modified
26 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 35.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formSetIptv via the list parameter, which can cause memory corruption and enable remote code execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents stack overflows by validating the 'list' parameter length and format in formSetIptv to avoid memory corruption.

prevent

Mitigates exploitation of the stack overflow through memory protections like stack canaries, ASLR, and non-executable memory to block remote code execution.

prevent

Requires timely firmware patching to remediate the specific stack overflow flaw in Tenda AX3 v16.03.12.11, eliminating the vulnerability.

Security SummaryAI

CVE-2025-69762 is a stack-based buffer overflow vulnerability (CWE-121) in Tenda AX3 firmware version 16.03.12.11, affecting the formSetIptv function when processing the "list" parameter. Published on 2026-01-21, this flaw causes memory corruption, enabling potential remote code execution. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its high impact on confidentiality, integrity, and availability.

Attackers can exploit this vulnerability remotely over the network without authentication, privileges, or user interaction, requiring only low complexity. Successful exploitation allows arbitrary code execution on the router, potentially granting full control over the device, including data theft, traffic manipulation, or use as a pivot for further network compromise.

Advisories and detailed analysis are available in the referenced Notion pages, including https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formSetIptv-2c9a595a7aef80718ff2c3869d32392d and https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formSetIptv-2c9a595a7aef80718ff2c3869d32392d?pvs=74, which cover the buffer overflow in formSetIptv.

Details

CWE(s)

Affected Products

tenda
ax3 firmware
16.03.12.11

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remotely exploitable buffer overflow in router firmware, enabling unauthenticated remote code execution on a public-facing network device, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References