CVE-2025-5978: Stack-based Buffer Overflow in Tenda FH1202
A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5978 is a critical security vulnerability identified in the Tenda FH1202 router, specifically version 1.2.0.14. The flaw exists in the fromVirtualSer function within the /goform/VirtualSer endpoint. This vulnerability is a stack-based buffer overflow caused by improper handling of the 'page' argument, which can be manipulated by an attacker. Because the vulnerability is remotely exploitable without requiring user interaction or elevated privileges, an attacker can send specially crafted requests to the affected router to trigger the overflow. This can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The CVSS 4.0 score of 8.7 (high severity) reflects the ease of exploitation (network attack vector, low complexity, no privileges or user interaction needed) and the significant impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects a widely deployed consumer-grade router model, which is often used in home and small office environments. The lack of an official patch or mitigation from the vendor at the time of disclosure further exacerbates the risk. Attackers exploiting this vulnerability could gain control over the device, intercept or manipulate network traffic, or disrupt network connectivity.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises (SMEs) and remote workers relying on Tenda FH1202 routers for internet connectivity. Compromise of these routers could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of business operations through denial of service. Given the router's role as a network gateway, successful exploitation could also serve as a foothold for lateral movement within corporate networks or as a launchpad for broader attacks. The confidentiality of communications could be severely impacted, and the integrity of transmitted data compromised. Additionally, availability issues caused by device crashes or reboots could interrupt critical business functions. The risk extends to home offices supporting European businesses, where such devices are commonly used without stringent security controls. The public availability of exploit code increases the likelihood of opportunistic attacks targeting vulnerable devices across Europe.
Mitigation Recommendations
Organizations and individuals using the Tenda FH1202 version 1.2.0.14 should immediately assess their exposure to this vulnerability. Since no official patch is currently available, the following specific mitigations are recommended: 1) Disable remote management interfaces on the router to prevent external exploitation; 2) Restrict access to the router's administrative interface to trusted internal IP addresses only; 3) Monitor network traffic for unusual requests targeting the /goform/VirtualSer endpoint; 4) Replace or upgrade affected devices to models with updated firmware that addresses this vulnerability as soon as a patch is released; 5) Employ network segmentation to isolate vulnerable devices from critical infrastructure; 6) Use intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available; 7) Educate users about the risks of using outdated router firmware and encourage regular updates; 8) Consider deploying additional endpoint security controls to detect anomalous behavior resulting from router compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5978: Stack-based Buffer Overflow in Tenda FH1202
Description
A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5978 is a critical security vulnerability identified in the Tenda FH1202 router, specifically version 1.2.0.14. The flaw exists in the fromVirtualSer function within the /goform/VirtualSer endpoint. This vulnerability is a stack-based buffer overflow caused by improper handling of the 'page' argument, which can be manipulated by an attacker. Because the vulnerability is remotely exploitable without requiring user interaction or elevated privileges, an attacker can send specially crafted requests to the affected router to trigger the overflow. This can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The CVSS 4.0 score of 8.7 (high severity) reflects the ease of exploitation (network attack vector, low complexity, no privileges or user interaction needed) and the significant impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects a widely deployed consumer-grade router model, which is often used in home and small office environments. The lack of an official patch or mitigation from the vendor at the time of disclosure further exacerbates the risk. Attackers exploiting this vulnerability could gain control over the device, intercept or manipulate network traffic, or disrupt network connectivity.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises (SMEs) and remote workers relying on Tenda FH1202 routers for internet connectivity. Compromise of these routers could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of business operations through denial of service. Given the router's role as a network gateway, successful exploitation could also serve as a foothold for lateral movement within corporate networks or as a launchpad for broader attacks. The confidentiality of communications could be severely impacted, and the integrity of transmitted data compromised. Additionally, availability issues caused by device crashes or reboots could interrupt critical business functions. The risk extends to home offices supporting European businesses, where such devices are commonly used without stringent security controls. The public availability of exploit code increases the likelihood of opportunistic attacks targeting vulnerable devices across Europe.
Mitigation Recommendations
Organizations and individuals using the Tenda FH1202 version 1.2.0.14 should immediately assess their exposure to this vulnerability. Since no official patch is currently available, the following specific mitigations are recommended: 1) Disable remote management interfaces on the router to prevent external exploitation; 2) Restrict access to the router's administrative interface to trusted internal IP addresses only; 3) Monitor network traffic for unusual requests targeting the /goform/VirtualSer endpoint; 4) Replace or upgrade affected devices to models with updated firmware that addresses this vulnerability as soon as a patch is released; 5) Employ network segmentation to isolate vulnerable devices from critical infrastructure; 6) Use intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available; 7) Educate users about the risks of using outdated router firmware and encourage regular updates; 8) Consider deploying additional endpoint security controls to detect anomalous behavior resulting from router compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-10T11:48:44.341Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6848a2383cd93dcca8310c77
Added to database: 6/10/2025, 9:23:04 PM
Last enriched: 7/10/2025, 10:48:32 PM
Last updated: 8/15/2025, 12:45:43 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.