CVE-2025-5080: Stack-based Buffer Overflow in Tenda FH451
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function webExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5080 is a critical security vulnerability identified in the Tenda FH451 router, specifically version 1.0.0.9. The flaw exists in the function webExcptypemanFilter located in the /goform/webExcptypemanFilter endpoint. The vulnerability arises from improper handling of the 'page' argument, which leads to a stack-based buffer overflow. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector details show that the attack can be launched over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) or user interaction (UI:N), and results in high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no public exploits are currently known in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation. The vulnerability affects only the specific firmware version 1.0.0.9 of the Tenda FH451 device, which is a consumer-grade router commonly used in home and small office environments. The lack of available patches at the time of disclosure increases the urgency for mitigation and risk management.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and home office setups relying on Tenda FH451 routers for internet connectivity. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full compromise of the device. This could result in interception or manipulation of network traffic, lateral movement within internal networks, data exfiltration, or disruption of internet access. Critical infrastructure or organizations with remote workers using vulnerable devices are at heightened risk. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or altered, and network availability could be compromised. Additionally, the public disclosure of exploit code increases the likelihood of opportunistic attacks targeting unpatched devices across Europe.
Mitigation Recommendations
Given the absence of an official patch at the time of disclosure, European organizations should take immediate steps to mitigate risk. First, identify and inventory all Tenda FH451 devices running firmware version 1.0.0.9 within the network. Where possible, isolate these devices from critical network segments or restrict remote management access to trusted IP addresses only. Employ network-level protections such as firewall rules to block access to the /goform/webExcptypemanFilter endpoint or the router's management interface from untrusted networks. Monitor network traffic for unusual activity indicative of exploitation attempts. Encourage users to update the router firmware as soon as a vendor patch becomes available. If firmware updates are delayed, consider replacing vulnerable devices with alternative models from vendors with timely security support. Additionally, implement network segmentation and use VPNs for remote access to reduce exposure. Regularly review vendor communications for patch releases and advisories.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5080: Stack-based Buffer Overflow in Tenda FH451
Description
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function webExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5080 is a critical security vulnerability identified in the Tenda FH451 router, specifically version 1.0.0.9. The flaw exists in the function webExcptypemanFilter located in the /goform/webExcptypemanFilter endpoint. The vulnerability arises from improper handling of the 'page' argument, which leads to a stack-based buffer overflow. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector details show that the attack can be launched over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) or user interaction (UI:N), and results in high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no public exploits are currently known in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation. The vulnerability affects only the specific firmware version 1.0.0.9 of the Tenda FH451 device, which is a consumer-grade router commonly used in home and small office environments. The lack of available patches at the time of disclosure increases the urgency for mitigation and risk management.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and home office setups relying on Tenda FH451 routers for internet connectivity. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full compromise of the device. This could result in interception or manipulation of network traffic, lateral movement within internal networks, data exfiltration, or disruption of internet access. Critical infrastructure or organizations with remote workers using vulnerable devices are at heightened risk. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or altered, and network availability could be compromised. Additionally, the public disclosure of exploit code increases the likelihood of opportunistic attacks targeting unpatched devices across Europe.
Mitigation Recommendations
Given the absence of an official patch at the time of disclosure, European organizations should take immediate steps to mitigate risk. First, identify and inventory all Tenda FH451 devices running firmware version 1.0.0.9 within the network. Where possible, isolate these devices from critical network segments or restrict remote management access to trusted IP addresses only. Employ network-level protections such as firewall rules to block access to the /goform/webExcptypemanFilter endpoint or the router's management interface from untrusted networks. Monitor network traffic for unusual activity indicative of exploitation attempts. Encourage users to update the router firmware as soon as a vendor patch becomes available. If firmware updates are delayed, consider replacing vulnerable devices with alternative models from vendors with timely security support. Additionally, implement network segmentation and use VPNs for remote access to reduce exposure. Regularly review vendor communications for patch releases and advisories.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-22T05:38:21.135Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682f3d940acd01a249261df8
Added to database: 5/22/2025, 3:07:00 PM
Last enriched: 7/8/2025, 8:40:12 AM
Last updated: 8/19/2025, 11:03:32 AM
Views: 20
Related Threats
CVE-2025-9132: Out of bounds write in Google Chrome
HighCVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
MediumCVE-2025-9176: OS Command Injection in neurobin shc
MediumCVE-2025-9175: Stack-based Buffer Overflow in neurobin shc
MediumCVE-2025-9174: OS Command Injection in neurobin shc
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.