CVE-2025-71024
Published: 13 January 2026
Summary
CVE-2025-71024 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Tenda Ax3 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack buffer overflow in router web interface function enables remote unauthenticated exploitation of public-facing app (T1190) to trigger application/system DoS via crafted request (T1499.004).
NVD Description
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the serviceName2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Deeper analysisAI
CVE-2025-71024 is a stack-based buffer overflow vulnerability affecting the Tenda AX-3 router on firmware version v16.03.12.10_CN. The issue resides in the serviceName2 parameter handled by the fromAdvSetMacMtuWan function, which can be triggered by malformed input. Published on 2026-01-13, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-787 (Out-of-bounds Write) and CWE-121 (Stack-based Buffer Overflow).
Remote attackers require only network access to the vulnerable device, with no authentication, privileges, or user interaction needed. By sending a specially crafted HTTP request targeting the affected function, an exploiter can trigger the stack overflow, resulting in a denial-of-service condition through device crash or reboot.
Details on the vulnerability, including reproduction steps, are available in the referenced GitHub repository at https://github.com/0-fool/VulnbyCola/blob/main/Tenda/AX-3/12/1.md. No vendor patches or official mitigation guidance are specified in the available information.
Details
- CWE(s)