CVE-2025-7468: Buffer Overflow in Tenda FH1201
A vulnerability has been found in Tenda FH1201 1.2.0.14 and classified as critical. This vulnerability affects the function fromSafeUrlFilter of the file /goform/fromSafeUrlFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7468 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router, specifically affecting version 1.2.0.14. The flaw resides in the HTTP POST request handler component, within the function fromSafeUrlFilter located at /goform/fromSafeUrlFilter. The vulnerability is triggered by manipulating the 'page' argument in the HTTP POST request, which leads to a buffer overflow condition. This type of vulnerability occurs when data exceeds the allocated buffer size, potentially overwriting adjacent memory and allowing an attacker to execute arbitrary code or cause a denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector details (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) show that the attack can be launched over the network with low complexity, no user interaction, and no privileges required, but partial privileges (PR:L) are needed, which suggests the attacker must have some limited access or be on the internal network. The vulnerability impacts confidentiality, integrity, and availability with high impact, as successful exploitation could lead to full system compromise or disruption of network services. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The absence of an official patch link indicates that mitigation might currently rely on workarounds or vendor updates pending release.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Tenda FH1201 routers in their network infrastructure. Exploitation could allow attackers to gain unauthorized control over network devices, leading to interception or manipulation of sensitive data, disruption of network connectivity, and potential lateral movement within corporate networks. This could affect confidentiality by exposing internal communications, integrity by altering data or configurations, and availability by causing device crashes or network outages. Critical infrastructure providers, SMEs, and enterprises using these routers could face operational disruptions and increased risk of data breaches. The vulnerability's remote exploitability without user interaction makes it a high-risk threat in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks.
Mitigation Recommendations
Given the lack of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. These include isolating affected Tenda FH1201 devices from untrusted networks, restricting management interfaces to trusted IP addresses only, and disabling remote management features if not required. Network segmentation should be enforced to limit access to these devices. Monitoring network traffic for unusual POST requests targeting /goform/fromSafeUrlFilter can help detect exploitation attempts. Organizations should also prioritize updating firmware as soon as the vendor releases a patch. Additionally, conducting an inventory of all Tenda FH1201 devices and replacing or upgrading those running vulnerable firmware versions is advisable. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can provide further protection. Finally, educating network administrators about this vulnerability and ensuring robust access controls on network devices will reduce exploitation risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-7468: Buffer Overflow in Tenda FH1201
Description
A vulnerability has been found in Tenda FH1201 1.2.0.14 and classified as critical. This vulnerability affects the function fromSafeUrlFilter of the file /goform/fromSafeUrlFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7468 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router, specifically affecting version 1.2.0.14. The flaw resides in the HTTP POST request handler component, within the function fromSafeUrlFilter located at /goform/fromSafeUrlFilter. The vulnerability is triggered by manipulating the 'page' argument in the HTTP POST request, which leads to a buffer overflow condition. This type of vulnerability occurs when data exceeds the allocated buffer size, potentially overwriting adjacent memory and allowing an attacker to execute arbitrary code or cause a denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector details (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) show that the attack can be launched over the network with low complexity, no user interaction, and no privileges required, but partial privileges (PR:L) are needed, which suggests the attacker must have some limited access or be on the internal network. The vulnerability impacts confidentiality, integrity, and availability with high impact, as successful exploitation could lead to full system compromise or disruption of network services. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The absence of an official patch link indicates that mitigation might currently rely on workarounds or vendor updates pending release.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Tenda FH1201 routers in their network infrastructure. Exploitation could allow attackers to gain unauthorized control over network devices, leading to interception or manipulation of sensitive data, disruption of network connectivity, and potential lateral movement within corporate networks. This could affect confidentiality by exposing internal communications, integrity by altering data or configurations, and availability by causing device crashes or network outages. Critical infrastructure providers, SMEs, and enterprises using these routers could face operational disruptions and increased risk of data breaches. The vulnerability's remote exploitability without user interaction makes it a high-risk threat in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks.
Mitigation Recommendations
Given the lack of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. These include isolating affected Tenda FH1201 devices from untrusted networks, restricting management interfaces to trusted IP addresses only, and disabling remote management features if not required. Network segmentation should be enforced to limit access to these devices. Monitoring network traffic for unusual POST requests targeting /goform/fromSafeUrlFilter can help detect exploitation attempts. Organizations should also prioritize updating firmware as soon as the vendor releases a patch. Additionally, conducting an inventory of all Tenda FH1201 devices and replacing or upgrading those running vulnerable firmware versions is advisable. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can provide further protection. Finally, educating network administrators about this vulnerability and ensuring robust access controls on network devices will reduce exploitation risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T11:58:23.393Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687227dba83201eaacb3a350
Added to database: 7/12/2025, 9:16:11 AM
Last enriched: 7/12/2025, 9:31:08 AM
Last updated: 7/12/2025, 6:14:32 PM
Views: 8
Related Threats
CVE-2025-7505: Stack-based Buffer Overflow in Tenda FH451
HighCVE-2025-7492: SQL Injection in PHPGurukul Vehicle Parking Management System
MediumCVE-2025-7491: SQL Injection in PHPGurukul Vehicle Parking Management System
MediumCVE-2025-7490: SQL Injection in PHPGurukul Vehicle Parking Management System
MediumCVE-2025-7489: SQL Injection in PHPGurukul Vehicle Parking Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.