Skip to main content

CVE-2025-6110: Stack-based Buffer Overflow in Tenda FH1201

High
VulnerabilityCVE-2025-6110cvecve-2025-6110
Published: Mon Jun 16 2025 (06/16/2025, 06:31:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1201

Description

A vulnerability classified as critical has been found in Tenda FH1201 1.2.0.14(408). This affects an unknown part of the file /goform/SafeMacFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/16/2025, 07:04:30 UTC

Technical Analysis

CVE-2025-6110 is a critical security vulnerability identified in the Tenda FH1201 router, specifically in firmware version 1.2.0.14(408). The vulnerability arises from a stack-based buffer overflow condition triggered by improper handling of the 'page' argument in the /goform/SafeMacFilter endpoint. This endpoint is likely part of the router's web management interface responsible for MAC address filtering functionality. An attacker can remotely send a specially crafted request to this endpoint without requiring user interaction or prior authentication, exploiting the buffer overflow to potentially execute arbitrary code on the device. The vulnerability is remotely exploitable over the network, increasing its risk profile. The CVSS 4.0 score is 8.7 (high severity), reflecting the ease of exploitation (network vector, low complexity), no privileges or user interaction required, and the high impact on confidentiality, integrity, and availability. While no public exploits are currently known in the wild, the disclosure of the exploit code means that threat actors could develop weaponized attacks quickly. The lack of available patches or vendor advisories at this time further exacerbates the risk. The vulnerability affects only the specified firmware version, but given the popularity of Tenda routers in consumer and small business environments, the attack surface is significant. Successful exploitation could allow attackers to take full control of the router, intercept or manipulate network traffic, pivot to internal networks, or cause denial of service conditions by crashing the device.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Tenda FH1201 routers, this vulnerability poses a significant risk. Compromise of the router can lead to interception of sensitive data, unauthorized network access, and lateral movement within corporate or home networks. This is particularly concerning for organizations with limited IT security resources that may not promptly update or replace vulnerable devices. The integrity and availability of network infrastructure could be severely impacted, disrupting business operations. Additionally, compromised routers could be leveraged as entry points for broader cyber espionage or ransomware campaigns targeting European entities. Given the remote exploitability without authentication, attackers can scan for vulnerable devices across Europe and launch automated attacks, increasing the likelihood of widespread impact. The vulnerability also threatens privacy compliance under regulations like GDPR if personal data is intercepted or exfiltrated via compromised routers.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level protections: restrict access to router management interfaces by implementing firewall rules that limit access to trusted IP addresses only. 2. Disable remote management features on the Tenda FH1201 routers if enabled, to reduce exposure. 3. Monitor network traffic for unusual activity indicative of exploitation attempts, such as anomalous requests to /goform/SafeMacFilter. 4. Deploy network intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability once available. 5. Engage with Tenda support channels to obtain firmware updates or patches; if none are available, consider replacing affected devices with models from vendors with active security maintenance. 6. Educate users and administrators about the risks of using outdated router firmware and the importance of timely updates. 7. For organizations with asset inventories, identify all Tenda FH1201 devices and prioritize their remediation. 8. Segment critical network assets behind additional layers of security to limit the impact of a compromised router. These steps go beyond generic advice by focusing on access control, monitoring, and asset management specific to this vulnerability and product.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-15T09:59:29.242Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684fbe72a8c921274383c379

Added to database: 6/16/2025, 6:49:22 AM

Last enriched: 6/16/2025, 7:04:30 AM

Last updated: 8/6/2025, 8:30:09 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats