CVE-2025-7531: Stack-based Buffer Overflow in Tenda FH1202
A vulnerability, which was classified as critical, was found in Tenda FH1202 1.2.0.14(408). This affects the function fromPptpUserSetting of the file /goform/PPTPUserSetting. The manipulation of the argument delno leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7531 is a critical stack-based buffer overflow vulnerability found in the Tenda FH1202 router, specifically in firmware version 1.2.0.14(408). The flaw exists in the function fromPptpUserSetting within the /goform/PPTPUserSetting endpoint. The vulnerability arises from improper handling of the 'delno' argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable over the network without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation (network attack vector, low complexity), no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as the attacker can potentially execute arbitrary code with system-level privileges, compromising the device and the network it serves. Although no public exploits are currently known in the wild, the vulnerability details have been disclosed publicly, increasing the risk of exploitation by threat actors. The Tenda FH1202 is a consumer and small office/home office (SOHO) router, often deployed in residential and small business environments. The vulnerability affects the router's PPTP user setting management interface, which is typically exposed on the device's web management interface or possibly through network services, increasing the attack surface.
Potential Impact
For European organizations, especially small businesses and residential users relying on Tenda FH1202 routers, this vulnerability poses a significant risk. Successful exploitation could lead to complete compromise of the affected router, allowing attackers to intercept, manipulate, or redirect network traffic, potentially leading to data breaches, espionage, or lateral movement within corporate networks. The disruption of network availability due to device crashes or reboots can impact business continuity. Given the router's role as a network gateway, attackers could also use compromised devices as footholds for launching further attacks against internal systems or as part of botnets for broader campaigns. The high severity and remote exploitability without authentication make this a critical concern for organizations that have not yet updated or mitigated the vulnerability. Additionally, the lack of an official patch at the time of disclosure increases exposure duration.
Mitigation Recommendations
1. Immediate mitigation should include isolating affected Tenda FH1202 devices from critical network segments to limit potential impact. 2. Disable PPTP VPN functionality or the /goform/PPTPUserSetting interface if not required, reducing the attack surface. 3. Implement network-level access controls to restrict management interface access to trusted IP addresses only. 4. Monitor network traffic for unusual activity or signs of exploitation attempts targeting the delno parameter or the PPTP user settings endpoint. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing affected devices with routers from vendors with a stronger security track record if patches are delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability once available. 8. Educate users and administrators about the risks of using outdated router firmware and the importance of secure configuration.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7531: Stack-based Buffer Overflow in Tenda FH1202
Description
A vulnerability, which was classified as critical, was found in Tenda FH1202 1.2.0.14(408). This affects the function fromPptpUserSetting of the file /goform/PPTPUserSetting. The manipulation of the argument delno leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7531 is a critical stack-based buffer overflow vulnerability found in the Tenda FH1202 router, specifically in firmware version 1.2.0.14(408). The flaw exists in the function fromPptpUserSetting within the /goform/PPTPUserSetting endpoint. The vulnerability arises from improper handling of the 'delno' argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable over the network without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation (network attack vector, low complexity), no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as the attacker can potentially execute arbitrary code with system-level privileges, compromising the device and the network it serves. Although no public exploits are currently known in the wild, the vulnerability details have been disclosed publicly, increasing the risk of exploitation by threat actors. The Tenda FH1202 is a consumer and small office/home office (SOHO) router, often deployed in residential and small business environments. The vulnerability affects the router's PPTP user setting management interface, which is typically exposed on the device's web management interface or possibly through network services, increasing the attack surface.
Potential Impact
For European organizations, especially small businesses and residential users relying on Tenda FH1202 routers, this vulnerability poses a significant risk. Successful exploitation could lead to complete compromise of the affected router, allowing attackers to intercept, manipulate, or redirect network traffic, potentially leading to data breaches, espionage, or lateral movement within corporate networks. The disruption of network availability due to device crashes or reboots can impact business continuity. Given the router's role as a network gateway, attackers could also use compromised devices as footholds for launching further attacks against internal systems or as part of botnets for broader campaigns. The high severity and remote exploitability without authentication make this a critical concern for organizations that have not yet updated or mitigated the vulnerability. Additionally, the lack of an official patch at the time of disclosure increases exposure duration.
Mitigation Recommendations
1. Immediate mitigation should include isolating affected Tenda FH1202 devices from critical network segments to limit potential impact. 2. Disable PPTP VPN functionality or the /goform/PPTPUserSetting interface if not required, reducing the attack surface. 3. Implement network-level access controls to restrict management interface access to trusted IP addresses only. 4. Monitor network traffic for unusual activity or signs of exploitation attempts targeting the delno parameter or the PPTP user settings endpoint. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing affected devices with routers from vendors with a stronger security track record if patches are delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability once available. 8. Educate users and administrators about the risks of using outdated router firmware and the importance of secure configuration.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-12T11:28:42.196Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6873d4bca83201eaacbc5426
Added to database: 7/13/2025, 3:46:04 PM
Last enriched: 7/20/2025, 9:03:52 PM
Last updated: 8/23/2025, 10:25:26 PM
Views: 37
Related Threats
CVE-2025-9394: Use After Free in PoDoFo
MediumCVE-2025-9393: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9392: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9391: SQL Injection in Bjskzy Zhiyou ERP
MediumCVE-2025-9390: Buffer Overflow in vim
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.