{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14636","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-13T01:55:39.525Z","datePublished":"2025-12-13T19:02:08.025Z","dateUpdated":"2026-02-24T05:49:20.379Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T05:49:20.379Z"},"title":"Tenda AX9 httpd image_check weak hash","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-328","lang":"en","description":"Use of Weak Hash"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-327","lang":"en","description":"Risky Cryptographic Algorithm"}]}],"affected":[{"vendor":"Tenda","product":"AX9","versions":[{"version":"22.03.01.46","status":"affected"}],"cpes":["cpe:2.3:o:tenda:ax9_firmware:*:*:*:*:*:*:*:*"],"modules":["httpd"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-13T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-13T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-13T21:59:01.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"IOT_Res (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.336361","name":"VDB-336361 | Tenda AX9 httpd image_check weak hash","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.336361","name":"VDB-336361 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.707213","name":"Submit #707213 | Tenda AX9 V22.03.01.46 CWE-327 Use of a Broken or Risky Cryptographic Algorithm","tags":["third-party-advisory"]},{"url":"https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/AX9_Inte.md","tags":["exploit","patch"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-15T21:44:39.098825Z","id":"CVE-2025-14636","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-15T21:44:49.245Z"}}]}}