CVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-14995 is a stack-based buffer overflow vulnerability identified in Tenda FH1201 router firmware version 1.2.0.14(408). The vulnerability exists in the sprintf function call within the /goform/SetIpBind endpoint, where improper validation or sanitization of the 'page' argument allows an attacker to overflow the stack buffer. This overflow can overwrite critical control data such as return addresses, enabling remote code execution or denial of service conditions. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The exploit manipulates HTTP requests sent to the router’s web management interface, targeting the vulnerable function to trigger the overflow. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no confirmed exploits in the wild have been reported, public disclosure of the exploit code increases the likelihood of exploitation attempts. The affected product, Tenda FH1201, is a widely used consumer-grade router, often deployed in home and small office networks, which may lack robust security monitoring. The vulnerability’s exploitation could lead to full device compromise, enabling attackers to intercept or manipulate network traffic, pivot into internal networks, or disrupt internet connectivity.
Potential Impact
The impact of CVE-2025-14995 is significant for organizations and individuals using the Tenda FH1201 router. Successful exploitation can lead to remote code execution, allowing attackers to gain control over the device without authentication. This compromises the confidentiality of network traffic, as attackers could intercept or redirect data. Integrity is at risk because attackers may alter router configurations or inject malicious payloads into network communications. Availability can be disrupted through denial of service attacks, rendering the router unusable and causing network outages. For businesses, this could mean loss of productivity, data breaches, and potential lateral movement into corporate networks. For home users, it could result in privacy violations and unauthorized access to connected devices. The public availability of exploit code increases the urgency for mitigation, as automated scanning and exploitation tools could rapidly target vulnerable devices. The lack of patches or updates at the time of disclosure exacerbates the risk, especially for users unaware of the vulnerability or unable to upgrade firmware promptly.
Mitigation Recommendations
To mitigate CVE-2025-14995, organizations and users should immediately check for firmware updates from Tenda addressing this vulnerability and apply them as soon as they become available. If no patch is currently available, users should restrict access to the router’s web management interface by limiting it to trusted internal networks and disabling remote management features. Implement network segmentation to isolate vulnerable devices from critical infrastructure. Employ firewall rules to block unsolicited inbound traffic to the router’s management ports. Monitor network traffic for unusual activity indicative of exploitation attempts, such as malformed HTTP requests targeting /goform/SetIpBind. Consider replacing affected devices with models from vendors with a stronger security track record if timely patching is not feasible. Additionally, users should change default credentials and enable strong authentication mechanisms where possible to reduce attack surface. Regularly audit network devices for known vulnerabilities and maintain an inventory to prioritize remediation efforts. Finally, educate users about the risks of exposing management interfaces to the internet and encourage best practices for secure device configuration.
Affected Countries
China, India, Russia, Brazil, United States, Indonesia, Vietnam, Egypt, South Africa, Mexico
CVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
Description
A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14995 is a stack-based buffer overflow vulnerability identified in Tenda FH1201 router firmware version 1.2.0.14(408). The vulnerability exists in the sprintf function call within the /goform/SetIpBind endpoint, where improper validation or sanitization of the 'page' argument allows an attacker to overflow the stack buffer. This overflow can overwrite critical control data such as return addresses, enabling remote code execution or denial of service conditions. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The exploit manipulates HTTP requests sent to the router’s web management interface, targeting the vulnerable function to trigger the overflow. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no confirmed exploits in the wild have been reported, public disclosure of the exploit code increases the likelihood of exploitation attempts. The affected product, Tenda FH1201, is a widely used consumer-grade router, often deployed in home and small office networks, which may lack robust security monitoring. The vulnerability’s exploitation could lead to full device compromise, enabling attackers to intercept or manipulate network traffic, pivot into internal networks, or disrupt internet connectivity.
Potential Impact
The impact of CVE-2025-14995 is significant for organizations and individuals using the Tenda FH1201 router. Successful exploitation can lead to remote code execution, allowing attackers to gain control over the device without authentication. This compromises the confidentiality of network traffic, as attackers could intercept or redirect data. Integrity is at risk because attackers may alter router configurations or inject malicious payloads into network communications. Availability can be disrupted through denial of service attacks, rendering the router unusable and causing network outages. For businesses, this could mean loss of productivity, data breaches, and potential lateral movement into corporate networks. For home users, it could result in privacy violations and unauthorized access to connected devices. The public availability of exploit code increases the urgency for mitigation, as automated scanning and exploitation tools could rapidly target vulnerable devices. The lack of patches or updates at the time of disclosure exacerbates the risk, especially for users unaware of the vulnerability or unable to upgrade firmware promptly.
Mitigation Recommendations
To mitigate CVE-2025-14995, organizations and users should immediately check for firmware updates from Tenda addressing this vulnerability and apply them as soon as they become available. If no patch is currently available, users should restrict access to the router’s web management interface by limiting it to trusted internal networks and disabling remote management features. Implement network segmentation to isolate vulnerable devices from critical infrastructure. Employ firewall rules to block unsolicited inbound traffic to the router’s management ports. Monitor network traffic for unusual activity indicative of exploitation attempts, such as malformed HTTP requests targeting /goform/SetIpBind. Consider replacing affected devices with models from vendors with a stronger security track record if timely patching is not feasible. Additionally, users should change default credentials and enable strong authentication mechanisms where possible to reduce attack surface. Regularly audit network devices for known vulnerabilities and maintain an inventory to prioritize remediation efforts. Finally, educate users about the risks of exposing management interfaces to the internet and encourage best practices for secure device configuration.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-20T12:22:21.229Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6947b3aa3cbe12b6f35cac8d
Added to database: 12/21/2025, 8:45:30 AM
Last enriched: 2/24/2026, 11:10:30 PM
Last updated: 3/26/2026, 3:11:33 AM
Views: 161
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.