Cyber Posture

CVE-2025-69764

CriticalPublic PoC

Published: 22 January 2026

Published
22 January 2026
Modified
26 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 35.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the stbpvid stack buffer, which may result in memory corruption and remote code execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the stack-based buffer overflow in formGetIptv by identifying, prioritizing, and applying firmware patches to eliminate the vulnerability.

prevent

Enforces validation of inputs to the stbpvid stack buffer in formGetIptv, preventing buffer overflows from malformed or oversized data.

prevent

Implements memory protections such as stack canaries and address space layout randomization to block exploitation of the stack buffer overflow leading to code execution.

Security SummaryAI

CVE-2025-69764 is a stack-based buffer overflow vulnerability affecting Tenda AX3 firmware version v16.03.12.11. The flaw occurs in the formGetIptv function due to improper handling of the stbpvid stack buffer, which can lead to memory corruption and remote code execution. It is classified under CWE-121 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability was published on 2026-01-22.

An unauthenticated remote attacker with network access can exploit this vulnerability with low attack complexity and without requiring user interaction. Successful exploitation may allow the attacker to achieve remote code execution on the targeted device, resulting in high impacts to confidentiality, integrity, and availability.

Mitigation details and further technical analysis are documented in the following references: https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formGetIptv-2c9a595a7aef80e9b90fdaa56f51374b and https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formGetIptv-2c9a595a7aef80e9b90fdaa56f51374b?source=copy_link.

Details

CWE(s)

Affected Products

tenda
ax3 firmware
16.03.12.11

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a stack-based buffer overflow in a router's web interface (formGetIptv), enabling unauthenticated remote code execution, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References