Skip to main content

CVE-2025-7548: Stack-based Buffer Overflow in Tenda FH1201

High
VulnerabilityCVE-2025-7548cvecve-2025-7548
Published: Sun Jul 13 2025 (07/13/2025, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1201

Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408) and classified as critical. This vulnerability affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/13/2025, 23:01:11 UTC

Technical Analysis

CVE-2025-7548 is a critical security vulnerability identified in the Tenda FH1201 router, specifically affecting firmware version 1.2.0.14(408). The flaw resides in the function formSafeEmailFilter within the /goform/SafeEmailFilter endpoint. The vulnerability is a stack-based buffer overflow triggered by improper handling of the 'page' argument. An attacker can remotely exploit this vulnerability without any authentication or user interaction, by sending a specially crafted request to the vulnerable endpoint. The buffer overflow can lead to arbitrary code execution, allowing an attacker to potentially take full control of the affected device. Given the nature of the vulnerability, it compromises the confidentiality, integrity, and availability of the router and any network it protects. The CVSS 4.0 base score is 8.7, reflecting a high severity with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be actively used in the wild, the disclosure of the exploit code increases the risk of imminent attacks. The vulnerability's presence in a widely deployed consumer and small office router model raises concerns about the security posture of networks relying on these devices, as compromised routers can be leveraged for further attacks such as network traffic interception, lateral movement, or as part of botnets.

Potential Impact

For European organizations, the exploitation of CVE-2025-7548 could have significant consequences. Many small and medium enterprises (SMEs) and home offices in Europe use Tenda routers due to their affordability and ease of deployment. A successful attack could lead to unauthorized access to internal networks, data breaches, and disruption of business operations. The compromise of network infrastructure devices like routers can facilitate man-in-the-middle attacks, data exfiltration, and persistent footholds for attackers. Critical sectors such as finance, healthcare, and government entities that rely on secure communications could face heightened risks. Additionally, the vulnerability could be exploited to launch distributed denial-of-service (DDoS) attacks or to propagate malware within European networks. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous, as automated scanning and exploitation campaigns could rapidly affect numerous devices across Europe.

Mitigation Recommendations

To mitigate the risks posed by CVE-2025-7548, European organizations should take immediate and specific actions beyond generic advice: 1) Identify and inventory all Tenda FH1201 devices running firmware version 1.2.0.14(408) within their networks. 2) Contact Tenda support or check official channels for firmware updates or patches addressing this vulnerability; if none are available, consider downgrading or upgrading to a non-vulnerable firmware version if possible. 3) Implement network segmentation to isolate vulnerable routers from critical assets and sensitive data. 4) Restrict remote management access to the routers by disabling WAN-side administration or limiting access via firewall rules to trusted IP addresses only. 5) Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting /goform/SafeEmailFilter. 6) Monitor network traffic for unusual patterns or spikes that may indicate exploitation attempts or compromise. 7) Educate IT staff about the vulnerability and ensure rapid incident response capabilities are in place. 8) Where feasible, replace vulnerable devices with models from vendors with robust security update policies. These steps will help reduce the attack surface and limit the potential impact of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-12T17:06:22.580Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874372ba83201eaacbf3d80

Added to database: 7/13/2025, 10:46:03 PM

Last enriched: 7/13/2025, 11:01:11 PM

Last updated: 7/16/2025, 2:33:36 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats