CVE-2025-71025
Published: 13 January 2026
Summary
CVE-2025-71025 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Tenda Ax3 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 22.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in public WAN config function directly enables remote unauthenticated DoS via application/system exploitation (T1499.004).
NVD Description
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the cloneType2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Deeper analysisAI
CVE-2025-71025 is a stack overflow vulnerability affecting the Tenda AX-3 router running firmware version v16.03.12.10_CN. The flaw resides in the cloneType2 parameter of the fromAdvSetMacMtuWan function, classified under CWE-787 (Out-of-bounds Write) and CWE-121 (Stack-based Buffer Overflow). It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to its impact on availability.
Remote attackers with network access can exploit this vulnerability without authentication or user interaction by sending a specially crafted request to the affected function. Successful exploitation triggers a stack overflow, enabling a Denial of Service (DoS) condition that disrupts device functionality.
Further technical details, including proof-of-concept information, are available in the referenced disclosure at https://github.com/0-fool/VulnbyCola/blob/main/Tenda/AX-3/10/1.md. No official vendor advisories or patches are specified in the available data.
Details
- CWE(s)