Skip to main content

CVE-2025-7531: Stack-based Buffer Overflow in Tenda FH1202

High
VulnerabilityCVE-2025-7531cvecve-2025-7531
Published: Sun Jul 13 2025 (07/13/2025, 15:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1202

Description

A vulnerability, which was classified as critical, was found in Tenda FH1202 1.2.0.14(408). This affects the function fromPptpUserSetting of the file /goform/PPTPUserSetting. The manipulation of the argument delno leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/13/2025, 16:01:07 UTC

Technical Analysis

CVE-2025-7531 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH1202 router, specifically version 1.2.0.14(408). The flaw exists in the function fromPptpUserSetting within the /goform/PPTPUserSetting endpoint. An attacker can exploit this vulnerability by manipulating the 'delno' argument, which leads to a stack-based buffer overflow condition. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 base score is 8.7 (high severity), reflecting the vulnerability's ease of exploitation (network vector, low attack complexity, no privileges or user interaction needed) and its significant impact on confidentiality, integrity, and availability. Although no public exploits are currently reported in the wild, the disclosure of the exploit code increases the likelihood of active exploitation attempts. The vulnerability affects a specific firmware version of the Tenda FH1202 router, a device commonly used in small office and home office environments for internet connectivity, often deployed in various regions including Europe. The absence of an official patch or mitigation from the vendor at the time of disclosure further elevates the risk to users of this device version.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially to small and medium enterprises (SMEs) and home office setups relying on Tenda FH1202 routers. Successful exploitation could lead to full compromise of the affected router, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches, espionage, or lateral movement within corporate networks. The compromise of network infrastructure devices like routers undermines the confidentiality, integrity, and availability of organizational communications. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices en masse, leading to widespread disruption or use of compromised routers as footholds for further attacks. This risk is exacerbated in sectors with sensitive data or critical infrastructure, such as finance, healthcare, and government agencies. Additionally, the public availability of exploit code increases the likelihood of automated scanning and exploitation campaigns targeting vulnerable devices across Europe.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Tenda FH1202 devices from critical network segments and the internet to prevent exploitation. Network administrators should monitor network traffic for unusual activity, especially targeting the /goform/PPTPUserSetting endpoint. Deploying network-level protections such as intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts against this vulnerability is recommended. Where possible, disable PPTP VPN functionality on the router if not in use, as this reduces the attack surface. Organizations should engage with Tenda support channels to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider replacing affected devices with models from vendors with timely security support. Additionally, implementing network segmentation and strict access controls can limit the impact of a compromised router. Regular vulnerability scanning and asset inventory updates will help identify and track affected devices. Finally, educating users about the risks and encouraging prompt reporting of network anomalies will aid in early detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-12T11:28:42.196Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6873d4bca83201eaacbc5426

Added to database: 7/13/2025, 3:46:04 PM

Last enriched: 7/13/2025, 4:01:07 PM

Last updated: 7/13/2025, 4:01:07 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats