Skip to main content

CVE-2025-7468: Buffer Overflow in Tenda FH1201

High
VulnerabilityCVE-2025-7468cvecve-2025-7468
Published: Sat Jul 12 2025 (07/12/2025, 09:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1201

Description

A vulnerability has been found in Tenda FH1201 1.2.0.14 and classified as critical. This vulnerability affects the function fromSafeUrlFilter of the file /goform/fromSafeUrlFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/19/2025, 20:59:47 UTC

Technical Analysis

CVE-2025-7468 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router, specifically in version 1.2.0.14. The flaw exists in the HTTP POST request handler component, within the function fromSafeUrlFilter located at /goform/fromSafeUrlFilter. The vulnerability arises due to improper handling of the 'page' argument, which can be manipulated by an attacker to trigger a buffer overflow condition. This type of vulnerability allows an attacker to overwrite memory adjacent to the buffer, potentially leading to arbitrary code execution, denial of service, or system compromise. The attack can be initiated remotely without requiring user interaction or authentication, making it highly exploitable. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector metrics show network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits are currently reported in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects a widely deployed consumer and small office/home office (SOHO) router model, which is commonly used to provide internet connectivity and network routing functions. Given the criticality and ease of exploitation, this vulnerability poses a significant threat to affected devices and their networks.

Potential Impact

For European organizations, the exploitation of CVE-2025-7468 could lead to severe consequences. Compromised Tenda FH1201 routers could allow attackers to gain unauthorized control over network traffic, intercept sensitive data, or pivot into internal networks, undermining confidentiality and integrity. The availability of network services could also be disrupted, causing operational downtime. Small and medium-sized enterprises (SMEs) and home offices that rely on this router model may be particularly vulnerable due to limited IT security resources and delayed patching. Additionally, critical infrastructure sectors that use these routers for network connectivity could face increased risk of espionage or sabotage. The remote and unauthenticated nature of the exploit means attackers can target devices over the internet, increasing the attack surface. The public availability of exploit code further elevates the threat level, potentially leading to widespread attacks if mitigations are not promptly applied.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations and users should verify if Tenda has released a patched firmware version addressing CVE-2025-7468 and apply it without delay. 2. Network segmentation: Isolate vulnerable routers from critical internal networks to limit potential lateral movement in case of compromise. 3. Access control: Restrict remote management interfaces and block HTTP POST requests to the vulnerable endpoint from untrusted networks using firewall rules. 4. Intrusion detection: Deploy network intrusion detection systems (NIDS) with signatures or heuristics to detect exploit attempts targeting /goform/fromSafeUrlFilter. 5. Device replacement: For environments where patching is not feasible or timely, consider replacing affected devices with models from vendors with stronger security track records. 6. Monitoring and incident response: Continuously monitor network traffic for anomalies and prepare incident response plans to quickly contain and remediate any exploitation attempts. 7. User awareness: Educate users about the risks of using outdated router firmware and encourage regular updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T11:58:23.393Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687227dba83201eaacb3a350

Added to database: 7/12/2025, 9:16:11 AM

Last enriched: 7/19/2025, 8:59:47 PM

Last updated: 8/22/2025, 10:59:00 PM

Views: 69

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats