Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
ax1806 Vendor: tenda

About This Product

ax1806 is a software product offered by tenda. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 61 known vulnerabilities affecting tenda ax1806. This includes 20 critical-severity issues and 39 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2022 to 2026, indicating a recent active security attention. 2 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2022-25546 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25547 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25548 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25549 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25550 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25551 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25552 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25553 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25554 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25555 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25557 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25558 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-25566 2022-03-10 2024-11-21 7.5 7.8 Likely
CVE-2022-28572 2022-05-02 2024-11-21 8.8 6.5 Likely
CVE-2022-28969 2022-05-06 2024-11-21 7.5 7.8 Likely
CVE-2022-28970 2022-05-06 2024-11-21 7.5 7.8 Likely
CVE-2022-28971 2022-05-06 2024-11-21 7.5 7.8 Likely
CVE-2022-28972 2022-05-06 2024-11-21 7.5 7.8 Likely
CVE-2022-28973 2022-05-06 2024-11-21 7.5 7.8 Likely
CVE-2022-32030 2022-07-01 2024-11-21 7.5 7.8 Likely
CVE-2022-32031 2022-07-01 2024-11-21 7.5 7.8 Likely
CVE-2022-32032 2022-07-01 2024-11-21 9.8 10.0 Likely
CVE-2022-32033 2022-07-01 2024-11-21 7.5 7.8 Likely
CVE-2022-34597 2022-07-06 2024-11-21 9.8 7.5 Likely
CVE-2023-47455 2023-11-07 2024-11-21 9.1 - -
CVE-2023-47456 2023-11-07 2024-11-21 9.1 - -
CVE-2024-4237 2024-04-26 2025-01-27 8.8 9.0 Likely
CVE-2024-4238 2024-04-26 2025-01-27 8.8 9.0 Likely
CVE-2024-4239 2024-04-26 2025-01-27 8.8 9.0 Likely
CVE-2024-35571 2024-05-20 2025-03-17 9.8 - -
CVE-2024-35576 2024-05-20 2025-03-17 5.2 - -
CVE-2024-35578 2024-05-20 2025-03-17 8.0 - -
CVE-2024-35579 2024-05-20 2025-03-17 7.7 - -
CVE-2024-35580 2024-05-20 2025-03-17 9.8 - -
CVE-2024-40417 2024-07-10 2025-04-07 6.5 - -
CVE-2024-40414 2024-07-15 2024-11-21 9.8 - -
CVE-2024-40415 2024-07-15 2024-11-21 9.8 - -
CVE-2024-40416 2024-07-15 2024-11-21 9.8 - -
CVE-2024-41492 2024-07-19 2025-04-07 7.5 - -
CVE-2024-44563 2024-08-26 2024-08-27 9.8 - -
CVE-2024-44565 2024-08-26 2024-08-27 9.8 - -
CVE-2024-44556 2024-08-26 2024-08-27 9.8 - -
CVE-2024-44558 2024-08-26 2024-08-27 9.8 - -
CVE-2024-44549 2024-08-26 2024-08-27 9.8 - -
CVE-2024-44550 2024-08-26 2024-08-27 9.8 - -
CVE-2024-44551 2024-08-26 2025-03-26 9.8 - -
CVE-2024-44552 2024-08-26 2025-03-18 9.8 - -
CVE-2024-44553 2024-08-26 2024-08-27 9.8 - -
CVE-2024-44555 2024-08-26 2024-08-27 9.8 - -
CVE-2024-44557 2024-08-26 2024-08-27 9.8 - -
CVE-2025-70753 2026-01-13 2026-01-16 7.5 - -
CVE-2025-70747 2026-01-14 2026-01-20 7.5 - -
CVE-2025-71021 2026-01-14 2026-01-20 7.5 - -
CVE-2025-70744 2026-01-15 2026-01-20 7.5 - -
CVE-2025-71019 2026-01-15 2026-01-20 7.5 - -
CVE-2025-70656 2026-01-15 2026-01-20 7.5 - -
CVE-2025-70746 2026-01-16 2026-01-26 7.5 - -
CVE-2025-71020 2026-01-16 2026-01-26 7.5 - -
CVE-2025-70645 2026-01-21 2026-01-26 7.5 - -
CVE-2025-70650 2026-01-21 2026-01-26 7.5 - -
CVE-2025-70644 2026-01-21 2026-01-26 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for tenda ax1806 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.