CVE-2025-7465: Buffer Overflow in Tenda FH1201
A vulnerability classified as critical was found in Tenda FH1201 1.2.0.14. Affected by this vulnerability is the function fromRouteStatic of the file /goform/fromRouteStatic of the component HTTP POST Request Handler. The manipulation of the argument page leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7465 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14. The flaw exists in the HTTP POST request handler, specifically within the fromRouteStatic function located at /goform/fromRouteStatic. The vulnerability arises due to improper handling of the 'page' argument, which can be manipulated by an attacker to cause a buffer overflow. This type of vulnerability allows an attacker to overwrite memory adjacent to the buffer, potentially leading to arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS v4.0 base score is 8.7, indicating a high severity level. The vector string (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) shows that the attack can be launched over the network with low complexity and no user interaction, but requires low privileges. The impact on confidentiality, integrity, and availability is high, meaning an attacker could fully compromise the device. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of exploitation. The lack of available patches at the time of disclosure further exacerbates the risk. Given that Tenda FH1201 is a consumer and small office/home office (SOHO) router, exploitation could allow attackers to gain control over network traffic, intercept sensitive data, or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially for small businesses and home offices relying on Tenda FH1201 routers for internet connectivity. Successful exploitation could lead to full device compromise, enabling attackers to intercept confidential communications, inject malicious traffic, or disrupt network availability. This could result in data breaches, loss of intellectual property, and operational downtime. Additionally, compromised routers could be leveraged as entry points for lateral movement within corporate networks or as part of botnets for broader attacks. The risk is heightened in environments where network segmentation is weak or where these devices serve as primary gateways without additional security controls. The lack of patches means organizations must rely on mitigation strategies until firmware updates are released. The public availability of exploit code increases the urgency for European entities to assess their exposure and implement protective measures promptly.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Tenda FH1201 devices from critical internal networks to limit potential lateral movement if compromised. 2. Disable remote management interfaces on the router to reduce exposure to external attacks. 3. Monitor network traffic for unusual patterns or signs of exploitation attempts targeting the /goform/fromRouteStatic endpoint. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against HTTP POST handlers. 5. Restrict access to the router's management interface to trusted IP addresses only. 6. Regularly audit and inventory network devices to identify the presence of vulnerable Tenda FH1201 routers. 7. Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed. 9. Educate users and administrators about the risks and signs of router compromise to enable rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-7465: Buffer Overflow in Tenda FH1201
Description
A vulnerability classified as critical was found in Tenda FH1201 1.2.0.14. Affected by this vulnerability is the function fromRouteStatic of the file /goform/fromRouteStatic of the component HTTP POST Request Handler. The manipulation of the argument page leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7465 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14. The flaw exists in the HTTP POST request handler, specifically within the fromRouteStatic function located at /goform/fromRouteStatic. The vulnerability arises due to improper handling of the 'page' argument, which can be manipulated by an attacker to cause a buffer overflow. This type of vulnerability allows an attacker to overwrite memory adjacent to the buffer, potentially leading to arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS v4.0 base score is 8.7, indicating a high severity level. The vector string (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) shows that the attack can be launched over the network with low complexity and no user interaction, but requires low privileges. The impact on confidentiality, integrity, and availability is high, meaning an attacker could fully compromise the device. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of exploitation. The lack of available patches at the time of disclosure further exacerbates the risk. Given that Tenda FH1201 is a consumer and small office/home office (SOHO) router, exploitation could allow attackers to gain control over network traffic, intercept sensitive data, or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially for small businesses and home offices relying on Tenda FH1201 routers for internet connectivity. Successful exploitation could lead to full device compromise, enabling attackers to intercept confidential communications, inject malicious traffic, or disrupt network availability. This could result in data breaches, loss of intellectual property, and operational downtime. Additionally, compromised routers could be leveraged as entry points for lateral movement within corporate networks or as part of botnets for broader attacks. The risk is heightened in environments where network segmentation is weak or where these devices serve as primary gateways without additional security controls. The lack of patches means organizations must rely on mitigation strategies until firmware updates are released. The public availability of exploit code increases the urgency for European entities to assess their exposure and implement protective measures promptly.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Tenda FH1201 devices from critical internal networks to limit potential lateral movement if compromised. 2. Disable remote management interfaces on the router to reduce exposure to external attacks. 3. Monitor network traffic for unusual patterns or signs of exploitation attempts targeting the /goform/fromRouteStatic endpoint. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against HTTP POST handlers. 5. Restrict access to the router's management interface to trusted IP addresses only. 6. Regularly audit and inventory network devices to identify the presence of vulnerable Tenda FH1201 routers. 7. Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed. 9. Educate users and administrators about the risks and signs of router compromise to enable rapid incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T11:55:50.175Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68720bbaa83201eaacb354dd
Added to database: 7/12/2025, 7:16:10 AM
Last enriched: 7/19/2025, 8:59:11 PM
Last updated: 8/23/2025, 6:18:17 AM
Views: 45
Related Threats
CVE-2025-9380: Hard-coded Credentials in FNKvision Y215 CCTV Camera
HighCVE-2025-9379: Insufficient Verification of Data Authenticity in Belkin AX1800
HighCVE-2025-8208: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in templatescoderthemes Spexo Addons for Elementor – Free Elementor Addons, Widgets and Templates
MediumCVE-2025-36174: CWE-434 Unrestricted Upload of File with Dangerous Type in IBM Integrated Analytics System
HighCVE-2025-36157: CWE-863 Incorrect Authorization in IBM Jazz Foundation
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.