Cyber Posture

CVE-2025-69763

CriticalPublic PoC

Published: 21 January 2026

Published
21 January 2026
Modified
26 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 35.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-69763 is a critical-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Tenda Ax3 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces validation of the vlanId parameter input to prevent stack overflow and memory corruption from crafted requests.

prevent

Implements memory protections such as stack canaries or DEP to block unauthorized code execution from stack-based buffer overflows.

prevent

Mandates timely flaw remediation through firmware patching to eliminate the specific stack overflow vulnerability in formSetIptv.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote code execution via stack-based buffer overflow in the router's web management interface (formSetIptv function) directly enables exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formSetIptv via the vlanId parameter, which can cause memory corruption and enable remote code execution.

Deeper analysisAI

CVE-2025-69763, published on 2026-01-21, is a stack-based buffer overflow vulnerability (CWE-121) affecting Tenda AX3 router firmware version 16.03.12.11. The flaw occurs in the formSetIptv function when processing the vlanId parameter, resulting in memory corruption that enables remote code execution. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its high impact on confidentiality, integrity, and availability.

Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and without requiring user interaction. By sending a specially crafted request targeting the vlanId parameter, attackers can trigger the stack overflow, overwrite memory, and achieve arbitrary code execution on the affected device, granting full control over the router.

Advisories and technical details are available at https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formSetIptv-2c9a595a7aef8025a3c6c4b102d95dd4.

Details

CWE(s)

Affected Products

tenda
ax3 firmware
16.03.12.11

CVEs Like This One

CVE-2025-69765Same product: Tenda Ax3
CVE-2025-69764Same product: Tenda Ax3
CVE-2025-69766Same product: Tenda Ax3
CVE-2025-69762Same product: Tenda Ax3
CVE-2025-71023Same product: Tenda Ax3
CVE-2025-55603Same product: Tenda Ax3
CVE-2025-71027Same product: Tenda Ax3
CVE-2025-55605Same product: Tenda Ax3
CVE-2025-71026Same product: Tenda Ax3
CVE-2025-71024Same product: Tenda Ax3

References