CVE-2025-71026
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-16
Assigner: MITRE
Description
Description
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wanSpeed2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | ax3_firmware | 16.03.12.10_cn |
| tenda | ax3 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack overflow in the wanSpeed2 parameter of the fromAdvSetMacMtuWan function in Tenda AX-3 v16.03.12.10_CN. An attacker can send a specially crafted request that triggers this overflow, causing the device to crash or become unresponsive. [1]
How can this vulnerability impact me? :
The vulnerability can cause a Denial of Service (DoS) on the affected device, meaning the device may crash or stop functioning properly, disrupting network connectivity and services relying on the Tenda AX-3 router. [1]
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70