Skip to main content

CVE-2025-7527: Stack-based Buffer Overflow in Tenda FH1202

High
VulnerabilityCVE-2025-7527cvecve-2025-7527
Published: Sun Jul 13 2025 (07/13/2025, 10:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1202

Description

A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/13/2025, 11:01:06 UTC

Technical Analysis

CVE-2025-7527 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH1202 router, specifically version 1.2.0.14(408). The flaw exists in the function fromAdvSetWan within the /goform/AdvSetWan endpoint. The vulnerability arises due to improper handling of the PPPOEPassword argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 score of 8.7 (high severity) reflects the ease of exploitation (network attack vector, low attack complexity, no privileges required) and the significant impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability affects a widely deployed consumer and small business router model, which is often used to provide internet connectivity in home and office environments. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, or disrupt network availability.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for small and medium enterprises (SMEs) and home office setups relying on Tenda FH1202 routers. Compromise of these devices can lead to unauthorized network access, data interception, and lateral movement within internal networks. Confidentiality of sensitive communications may be breached, and integrity of network traffic can be undermined. Availability may also be impacted if the device crashes or is taken offline by attackers. Given the router's role as a network gateway, exploitation could facilitate further attacks on connected systems or enable attackers to establish persistent footholds. The risk is heightened in sectors with sensitive data or critical infrastructure components connected behind these routers. Additionally, the lack of authentication requirement and remote exploitability means attackers can target vulnerable devices en masse, potentially leading to large-scale disruptions or espionage campaigns within European networks.

Mitigation Recommendations

Immediate mitigation should focus on isolating affected Tenda FH1202 devices from untrusted networks until a patch or firmware update is available. Network administrators should implement strict firewall rules to restrict access to the /goform/AdvSetWan endpoint, ideally blocking external WAN access to router management interfaces. Deploy network segmentation to limit the impact of a compromised router on internal systems. Monitoring network traffic for unusual patterns or signs of exploitation attempts targeting the PPPOEPassword parameter is recommended. Organizations should contact Tenda for official firmware updates addressing this vulnerability and apply them promptly once released. If updates are unavailable, consider replacing affected devices with models from vendors with active security support. Additionally, educating users about the risks and encouraging the use of strong, unique passwords for router management can reduce attack surface. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability may help detect exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-12T11:28:30.697Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68738e6ca83201eaacb9b175

Added to database: 7/13/2025, 10:46:04 AM

Last enriched: 7/13/2025, 11:01:06 AM

Last updated: 7/13/2025, 3:54:01 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats