Skip to main content

CVE-2025-7465: Buffer Overflow in Tenda FH1201

High
VulnerabilityCVE-2025-7465cvecve-2025-7465
Published: Sat Jul 12 2025 (07/12/2025, 07:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1201

Description

A vulnerability classified as critical was found in Tenda FH1201 1.2.0.14. Affected by this vulnerability is the function fromRouteStatic of the file /goform/fromRouteStatic of the component HTTP POST Request Handler. The manipulation of the argument page leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/19/2025, 20:59:11 UTC

Technical Analysis

CVE-2025-7465 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14. The flaw exists in the HTTP POST request handler, specifically within the fromRouteStatic function located at /goform/fromRouteStatic. The vulnerability arises due to improper handling of the 'page' argument, which can be manipulated by an attacker to cause a buffer overflow. This type of vulnerability allows an attacker to overwrite memory adjacent to the buffer, potentially leading to arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS v4.0 base score is 8.7, indicating a high severity level. The vector string (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) shows that the attack can be launched over the network with low complexity and no user interaction, but requires low privileges. The impact on confidentiality, integrity, and availability is high, meaning an attacker could fully compromise the device. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of exploitation. The lack of available patches at the time of disclosure further exacerbates the risk. Given that Tenda FH1201 is a consumer and small office/home office (SOHO) router, exploitation could allow attackers to gain control over network traffic, intercept sensitive data, or pivot into internal networks.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially for small businesses and home offices relying on Tenda FH1201 routers for internet connectivity. Successful exploitation could lead to full device compromise, enabling attackers to intercept confidential communications, inject malicious traffic, or disrupt network availability. This could result in data breaches, loss of intellectual property, and operational downtime. Additionally, compromised routers could be leveraged as entry points for lateral movement within corporate networks or as part of botnets for broader attacks. The risk is heightened in environments where network segmentation is weak or where these devices serve as primary gateways without additional security controls. The lack of patches means organizations must rely on mitigation strategies until firmware updates are released. The public availability of exploit code increases the urgency for European entities to assess their exposure and implement protective measures promptly.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Tenda FH1201 devices from critical internal networks to limit potential lateral movement if compromised. 2. Disable remote management interfaces on the router to reduce exposure to external attacks. 3. Monitor network traffic for unusual patterns or signs of exploitation attempts targeting the /goform/fromRouteStatic endpoint. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against HTTP POST handlers. 5. Restrict access to the router's management interface to trusted IP addresses only. 6. Regularly audit and inventory network devices to identify the presence of vulnerable Tenda FH1201 routers. 7. Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed. 9. Educate users and administrators about the risks and signs of router compromise to enable rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T11:55:50.175Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68720bbaa83201eaacb354dd

Added to database: 7/12/2025, 7:16:10 AM

Last enriched: 7/19/2025, 8:59:11 PM

Last updated: 8/23/2025, 6:18:17 AM

Views: 45

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats