CVE-2025-7463: Buffer Overflow in Tenda FH1201
A vulnerability was found in Tenda FH1201 1.2.0.14. It has been declared as critical. This vulnerability affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset of the component HTTP POST Request Handler. The manipulation of the argument mit_ssid leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7463 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router, specifically in firmware version 1.2.0.14. The flaw resides in the HTTP POST request handler component, within the function formWrlsafeset located at /goform/AdvSetWrlsafeset. The vulnerability is triggered by manipulating the 'mit_ssid' argument, which leads to a buffer overflow condition. This type of vulnerability allows an attacker to overwrite memory beyond the intended buffer boundaries, potentially enabling arbitrary code execution, denial of service, or system compromise. The attack vector is remote and does not require user interaction or prior authentication, making it highly exploitable over the network. The CVSS v4.0 score is 8.7, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability with high impact, as indicated by the CVSS vector. Although no public exploits have been reported in the wild yet, the exploit code has been disclosed publicly, increasing the risk of imminent exploitation. The absence of an official patch or mitigation from the vendor at the time of disclosure further elevates the threat level. Given the critical nature of the vulnerability and the widespread use of Tenda routers in consumer and small business environments, this vulnerability poses a significant risk to affected networks.
Potential Impact
For European organizations, the impact of CVE-2025-7463 can be substantial. Many small and medium enterprises (SMEs) and residential users rely on Tenda FH1201 routers for internet connectivity. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over the router, intercept or manipulate network traffic, and potentially pivot into internal networks. This compromises confidentiality by exposing sensitive data, integrity by allowing malicious modifications, and availability by causing device crashes or network outages. Critical infrastructure or business operations relying on these routers could face service disruptions. Additionally, compromised routers could be leveraged as part of botnets for broader attacks, amplifying the threat landscape in Europe. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability at scale, increasing the risk to European organizations that have not yet updated or replaced vulnerable devices.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Tenda FH1201 devices from critical network segments and restricting remote management access to trusted IP addresses only. Network administrators should implement strict firewall rules to block incoming HTTP POST requests targeting the vulnerable endpoint (/goform/AdvSetWrlsafeset). Monitoring network traffic for unusual POST requests containing suspicious 'mit_ssid' parameters can help detect exploitation attempts. Organizations should prioritize inventorying all Tenda FH1201 devices and assess firmware versions. Until an official patch is released, consider replacing vulnerable routers with models from vendors with timely security updates. Employ network segmentation to limit exposure of vulnerable devices and use intrusion detection/prevention systems (IDS/IPS) configured to detect buffer overflow attack signatures. Regularly update router firmware when vendor patches become available and apply security best practices such as disabling remote management if not required. Finally, educate users about the risks of using outdated network devices and encourage timely updates or replacements.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7463: Buffer Overflow in Tenda FH1201
Description
A vulnerability was found in Tenda FH1201 1.2.0.14. It has been declared as critical. This vulnerability affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset of the component HTTP POST Request Handler. The manipulation of the argument mit_ssid leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7463 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router, specifically in firmware version 1.2.0.14. The flaw resides in the HTTP POST request handler component, within the function formWrlsafeset located at /goform/AdvSetWrlsafeset. The vulnerability is triggered by manipulating the 'mit_ssid' argument, which leads to a buffer overflow condition. This type of vulnerability allows an attacker to overwrite memory beyond the intended buffer boundaries, potentially enabling arbitrary code execution, denial of service, or system compromise. The attack vector is remote and does not require user interaction or prior authentication, making it highly exploitable over the network. The CVSS v4.0 score is 8.7, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability with high impact, as indicated by the CVSS vector. Although no public exploits have been reported in the wild yet, the exploit code has been disclosed publicly, increasing the risk of imminent exploitation. The absence of an official patch or mitigation from the vendor at the time of disclosure further elevates the threat level. Given the critical nature of the vulnerability and the widespread use of Tenda routers in consumer and small business environments, this vulnerability poses a significant risk to affected networks.
Potential Impact
For European organizations, the impact of CVE-2025-7463 can be substantial. Many small and medium enterprises (SMEs) and residential users rely on Tenda FH1201 routers for internet connectivity. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over the router, intercept or manipulate network traffic, and potentially pivot into internal networks. This compromises confidentiality by exposing sensitive data, integrity by allowing malicious modifications, and availability by causing device crashes or network outages. Critical infrastructure or business operations relying on these routers could face service disruptions. Additionally, compromised routers could be leveraged as part of botnets for broader attacks, amplifying the threat landscape in Europe. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability at scale, increasing the risk to European organizations that have not yet updated or replaced vulnerable devices.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Tenda FH1201 devices from critical network segments and restricting remote management access to trusted IP addresses only. Network administrators should implement strict firewall rules to block incoming HTTP POST requests targeting the vulnerable endpoint (/goform/AdvSetWrlsafeset). Monitoring network traffic for unusual POST requests containing suspicious 'mit_ssid' parameters can help detect exploitation attempts. Organizations should prioritize inventorying all Tenda FH1201 devices and assess firmware versions. Until an official patch is released, consider replacing vulnerable routers with models from vendors with timely security updates. Employ network segmentation to limit exposure of vulnerable devices and use intrusion detection/prevention systems (IDS/IPS) configured to detect buffer overflow attack signatures. Regularly update router firmware when vendor patches become available and apply security best practices such as disabling remote management if not required. Finally, educate users about the risks of using outdated network devices and encourage timely updates or replacements.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T11:32:33.910Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6871fda7a83201eaacb32a2f
Added to database: 7/12/2025, 6:16:07 AM
Last enriched: 7/19/2025, 8:58:58 PM
Last updated: 8/23/2025, 4:46:04 AM
Views: 52
Related Threats
CVE-2025-36174: CWE-434 Unrestricted Upload of File with Dangerous Type in IBM Integrated Analytics System
HighCVE-2025-36157: CWE-863 Incorrect Authorization in IBM Jazz Foundation
CriticalCVE-2025-5821: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Case-Themes Case Theme User
CriticalCVE-2025-5060: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Bravis-Themes Bravis User
HighCVE-2025-9363: Stack-based Buffer Overflow in Linksys RE6250
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.