Skip to main content

CVE-2025-7468: Buffer Overflow in Tenda FH1201

High
VulnerabilityCVE-2025-7468cvecve-2025-7468
Published: Sat Jul 12 2025 (07/12/2025, 09:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1201

Description

A vulnerability has been found in Tenda FH1201 1.2.0.14 and classified as critical. This vulnerability affects the function fromSafeUrlFilter of the file /goform/fromSafeUrlFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/12/2025, 09:31:08 UTC

Technical Analysis

CVE-2025-7468 is a critical buffer overflow vulnerability identified in the Tenda FH1201 router, specifically affecting version 1.2.0.14. The flaw resides in the HTTP POST request handler component, within the function fromSafeUrlFilter located at /goform/fromSafeUrlFilter. The vulnerability is triggered by manipulating the 'page' argument in the HTTP POST request, which leads to a buffer overflow condition. This type of vulnerability occurs when data exceeds the allocated buffer size, potentially overwriting adjacent memory and allowing an attacker to execute arbitrary code or cause a denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector details (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) show that the attack can be launched over the network with low complexity, no user interaction, and no privileges required, but partial privileges (PR:L) are needed, which suggests the attacker must have some limited access or be on the internal network. The vulnerability impacts confidentiality, integrity, and availability with high impact, as successful exploitation could lead to full system compromise or disruption of network services. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The absence of an official patch link indicates that mitigation might currently rely on workarounds or vendor updates pending release.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Tenda FH1201 routers in their network infrastructure. Exploitation could allow attackers to gain unauthorized control over network devices, leading to interception or manipulation of sensitive data, disruption of network connectivity, and potential lateral movement within corporate networks. This could affect confidentiality by exposing internal communications, integrity by altering data or configurations, and availability by causing device crashes or network outages. Critical infrastructure providers, SMEs, and enterprises using these routers could face operational disruptions and increased risk of data breaches. The vulnerability's remote exploitability without user interaction makes it a high-risk threat in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks.

Mitigation Recommendations

Given the lack of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. These include isolating affected Tenda FH1201 devices from untrusted networks, restricting management interfaces to trusted IP addresses only, and disabling remote management features if not required. Network segmentation should be enforced to limit access to these devices. Monitoring network traffic for unusual POST requests targeting /goform/fromSafeUrlFilter can help detect exploitation attempts. Organizations should also prioritize updating firmware as soon as the vendor releases a patch. Additionally, conducting an inventory of all Tenda FH1201 devices and replacing or upgrading those running vulnerable firmware versions is advisable. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can provide further protection. Finally, educating network administrators about this vulnerability and ensuring robust access controls on network devices will reduce exploitation risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T11:58:23.393Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687227dba83201eaacb3a350

Added to database: 7/12/2025, 9:16:11 AM

Last enriched: 7/12/2025, 9:31:08 AM

Last updated: 7/12/2025, 6:14:32 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats