CVE-2025-6113: Buffer Overflow in Tenda FH1203
A vulnerability, which was classified as critical, was found in Tenda FH1203 2.0.1.6. Affected is the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-6113 is a critical buffer overflow vulnerability identified in the Tenda FH1203 router, specifically in firmware version 2.0.1.6. The flaw exists in the function fromadvsetlanip within the /goform/AdvSetLanip endpoint. This function processes the lanMask argument, and improper handling of this input leads to a buffer overflow condition. Because the vulnerability is remotely exploitable without authentication or user interaction, an attacker can send specially crafted requests to the affected router to trigger the overflow. This can result in arbitrary code execution, potentially allowing full control over the device. The vulnerability has a CVSS 4.0 score of 8.7 (high severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently observed in the wild, the exploit details have been disclosed, increasing the risk of imminent exploitation. The absence of official patches or mitigation guidance from the vendor at this time further elevates the threat. Given that Tenda FH1203 routers are commonly deployed in small office and home office environments, exploitation could lead to network compromise, interception of sensitive data, or use of the device as a pivot point for lateral movement within corporate networks.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and remote workers relying on Tenda FH1203 routers for internet connectivity. Successful exploitation could lead to unauthorized access to internal networks, data exfiltration, disruption of network services, and potential deployment of malware or ransomware. The compromise of these routers could also facilitate man-in-the-middle attacks, undermining confidentiality and integrity of communications. Given the critical nature of the flaw and the lack of authentication requirements, attackers could target vulnerable devices en masse, leading to widespread service disruption. This is particularly concerning for sectors with high reliance on secure communications such as finance, healthcare, and critical infrastructure. Additionally, compromised routers could be recruited into botnets, amplifying threats to broader internet stability and security.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Tenda FH1203 devices from critical internal networks to limit potential lateral movement if compromised. 2. Disable remote management interfaces on affected routers to reduce exposure to external attacks. 3. Monitor network traffic for unusual patterns or signs of exploitation attempts targeting /goform/AdvSetLanip endpoints. 4. Implement strict firewall rules to restrict inbound access to router management ports from untrusted networks. 5. Where possible, replace Tenda FH1203 routers with alternative devices from vendors with active security support and patch availability. 6. If replacement is not immediately feasible, consider deploying virtual patching via intrusion prevention systems (IPS) to detect and block exploit attempts. 7. Engage with Tenda support channels to obtain any forthcoming patches or firmware updates and apply them promptly. 8. Educate users about the risks of using outdated or unsupported network devices and encourage regular device inventory and security assessments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-6113: Buffer Overflow in Tenda FH1203
Description
A vulnerability, which was classified as critical, was found in Tenda FH1203 2.0.1.6. Affected is the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-6113 is a critical buffer overflow vulnerability identified in the Tenda FH1203 router, specifically in firmware version 2.0.1.6. The flaw exists in the function fromadvsetlanip within the /goform/AdvSetLanip endpoint. This function processes the lanMask argument, and improper handling of this input leads to a buffer overflow condition. Because the vulnerability is remotely exploitable without authentication or user interaction, an attacker can send specially crafted requests to the affected router to trigger the overflow. This can result in arbitrary code execution, potentially allowing full control over the device. The vulnerability has a CVSS 4.0 score of 8.7 (high severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently observed in the wild, the exploit details have been disclosed, increasing the risk of imminent exploitation. The absence of official patches or mitigation guidance from the vendor at this time further elevates the threat. Given that Tenda FH1203 routers are commonly deployed in small office and home office environments, exploitation could lead to network compromise, interception of sensitive data, or use of the device as a pivot point for lateral movement within corporate networks.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and remote workers relying on Tenda FH1203 routers for internet connectivity. Successful exploitation could lead to unauthorized access to internal networks, data exfiltration, disruption of network services, and potential deployment of malware or ransomware. The compromise of these routers could also facilitate man-in-the-middle attacks, undermining confidentiality and integrity of communications. Given the critical nature of the flaw and the lack of authentication requirements, attackers could target vulnerable devices en masse, leading to widespread service disruption. This is particularly concerning for sectors with high reliance on secure communications such as finance, healthcare, and critical infrastructure. Additionally, compromised routers could be recruited into botnets, amplifying threats to broader internet stability and security.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Tenda FH1203 devices from critical internal networks to limit potential lateral movement if compromised. 2. Disable remote management interfaces on affected routers to reduce exposure to external attacks. 3. Monitor network traffic for unusual patterns or signs of exploitation attempts targeting /goform/AdvSetLanip endpoints. 4. Implement strict firewall rules to restrict inbound access to router management ports from untrusted networks. 5. Where possible, replace Tenda FH1203 routers with alternative devices from vendors with active security support and patch availability. 6. If replacement is not immediately feasible, consider deploying virtual patching via intrusion prevention systems (IPS) to detect and block exploit attempts. 7. Engage with Tenda support channels to obtain any forthcoming patches or firmware updates and apply them promptly. 8. Educate users about the risks of using outdated or unsupported network devices and encourage regular device inventory and security assessments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-15T10:02:16.885Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 684fd38ba8c921274383d979
Added to database: 6/16/2025, 8:19:23 AM
Last enriched: 6/16/2025, 8:34:30 AM
Last updated: 8/18/2025, 11:34:08 PM
Views: 18
Related Threats
CVE-2025-7221: CWE-285 Improper Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform
MediumCVE-2025-9305: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9304: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-55297: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in espressif esp-idf
MediumCVE-2025-53251: CWE-434 Unrestricted Upload of File with Dangerous Type in An-Themes Pin WP
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.