Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
ax3_firmware Vendor: tenda

About This Product

ax3_firmware is a software product offered by tenda. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 52 known vulnerabilities affecting tenda ax3_firmware. This includes 16 critical-severity issues and 35 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2022 to 2026, indicating a recent active security attention. 1 medium-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2022-24142 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24143 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24144 2022-02-04 2024-11-21 9.8 7.5 Likely
CVE-2022-24145 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24146 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24147 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24148 2022-02-04 2024-11-21 9.8 7.5 Likely
CVE-2022-24149 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24150 2022-02-04 2024-11-21 9.8 7.5 Likely
CVE-2022-24151 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24152 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24153 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24154 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24155 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24156 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24157 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24158 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24159 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24160 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24161 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24162 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2022-24163 2022-02-04 2024-11-21 7.5 7.8 Likely
CVE-2021-46393 2022-03-04 2024-11-21 9.8 7.5 Likely
CVE-2021-46394 2022-03-04 2024-11-21 9.8 7.5 Likely
CVE-2022-24995 2022-03-10 2024-11-21 9.8 7.5 Likely
CVE-2023-24212 2023-02-23 2024-11-21 9.8 - -
CVE-2023-27239 2023-03-15 2025-02-27 9.8 - -
CVE-2023-27240 2023-03-15 2024-11-21 9.8 - -
CVE-2023-27042 2023-03-24 2025-02-20 8.8 - -
CVE-2023-40915 2023-08-25 2024-11-21 7.5 - -
CVE-2023-49408 2023-12-07 2024-11-21 9.8 - -
CVE-2023-49409 2023-12-07 2024-11-21 9.8 - -
CVE-2023-51812 2024-01-04 2025-06-03 9.8 - -
CVE-2023-47422 2024-02-20 2025-04-25 8.8 - -
CVE-2025-55603 2025-08-22 2025-09-26 7.5 - -
CVE-2025-55605 2025-08-22 2025-09-26 7.5 - -
CVE-2025-55606 2025-08-22 2025-09-26 7.5 - -
CVE-2025-63454 2025-10-31 2025-11-05 7.5 - -
CVE-2025-63152 2025-11-10 2025-11-17 7.5 - -
CVE-2025-63147 2025-11-10 2025-11-18 7.5 - -
CVE-2025-63455 2025-11-10 2025-11-17 7.5 - -
CVE-2025-63149 2025-11-10 2025-11-17 7.5 - -
CVE-2025-65804 2025-12-08 2025-12-11 6.5 - -
CVE-2025-71023 2026-01-13 2026-01-20 7.5 - -
CVE-2025-71024 2026-01-13 2026-01-16 7.5 - -
CVE-2025-71025 2026-01-13 2026-01-16 7.5 - -
CVE-2025-71026 2026-01-13 2026-01-16 7.5 - -
CVE-2025-71027 2026-01-13 2026-01-16 7.5 - -
CVE-2025-69762 2026-01-21 2026-01-26 9.8 - -
CVE-2025-69763 2026-01-21 2026-01-26 9.8 - -
CVE-2025-69766 2026-01-21 2026-01-26 9.8 - -
CVE-2025-69764 2026-01-22 2026-01-26 9.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for tenda ax3_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.