CVE-2025-7550: Stack-based Buffer Overflow in Tenda FH1201
A vulnerability was found in Tenda FH1201 1.2.0.14(408). It has been classified as critical. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer. The manipulation of the argument dips leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7550 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH1201 router, specifically in version 1.2.0.14(408). The vulnerability exists in the function fromGstDhcpSetSer within the /goform/GstDhcpSetSer file. The flaw arises due to improper handling and manipulation of the 'dips' argument, which leads to a stack-based buffer overflow condition. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 8.7 (high severity) reflects the significant impact on confidentiality, integrity, and availability, with high exploitability and no user interaction needed. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects a widely used consumer-grade router model, which is often deployed in home and small office environments, making it a critical target for attackers aiming to compromise network infrastructure or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for small and medium enterprises (SMEs) and home office setups that utilize Tenda FH1201 routers. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over the router, intercept or manipulate network traffic, and potentially launch further attacks within the internal network. This could result in data breaches, disruption of business operations, and compromise of sensitive information. Given the router's role as a network gateway, successful exploitation could undermine network integrity and availability, impacting business continuity. Additionally, the lack of authentication requirement and remote exploitability increases the threat surface, making it easier for attackers to target vulnerable devices across Europe. The public availability of exploit code further elevates the risk of widespread attacks, including automated scanning and exploitation campaigns targeting vulnerable Tenda FH1201 devices.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately identify and inventory all Tenda FH1201 routers running the affected firmware version 1.2.0.14(408). 2) Apply any available firmware updates or patches from Tenda as soon as they are released; if no patch is currently available, contact Tenda support for guidance or consider temporary mitigations. 3) Restrict remote management access to the router by disabling WAN-side administration interfaces or limiting access via firewall rules to trusted IP addresses only. 4) Implement network segmentation to isolate vulnerable routers from critical internal systems, reducing the potential impact of compromise. 5) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected connections or anomalous DHCP-related requests. 6) Consider replacing affected devices with models from vendors with a stronger security track record if patches are not forthcoming. 7) Educate users and administrators about the risks and signs of exploitation to enable rapid detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7550: Stack-based Buffer Overflow in Tenda FH1201
Description
A vulnerability was found in Tenda FH1201 1.2.0.14(408). It has been classified as critical. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer. The manipulation of the argument dips leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7550 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH1201 router, specifically in version 1.2.0.14(408). The vulnerability exists in the function fromGstDhcpSetSer within the /goform/GstDhcpSetSer file. The flaw arises due to improper handling and manipulation of the 'dips' argument, which leads to a stack-based buffer overflow condition. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 8.7 (high severity) reflects the significant impact on confidentiality, integrity, and availability, with high exploitability and no user interaction needed. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects a widely used consumer-grade router model, which is often deployed in home and small office environments, making it a critical target for attackers aiming to compromise network infrastructure or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for small and medium enterprises (SMEs) and home office setups that utilize Tenda FH1201 routers. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over the router, intercept or manipulate network traffic, and potentially launch further attacks within the internal network. This could result in data breaches, disruption of business operations, and compromise of sensitive information. Given the router's role as a network gateway, successful exploitation could undermine network integrity and availability, impacting business continuity. Additionally, the lack of authentication requirement and remote exploitability increases the threat surface, making it easier for attackers to target vulnerable devices across Europe. The public availability of exploit code further elevates the risk of widespread attacks, including automated scanning and exploitation campaigns targeting vulnerable Tenda FH1201 devices.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately identify and inventory all Tenda FH1201 routers running the affected firmware version 1.2.0.14(408). 2) Apply any available firmware updates or patches from Tenda as soon as they are released; if no patch is currently available, contact Tenda support for guidance or consider temporary mitigations. 3) Restrict remote management access to the router by disabling WAN-side administration interfaces or limiting access via firewall rules to trusted IP addresses only. 4) Implement network segmentation to isolate vulnerable routers from critical internal systems, reducing the potential impact of compromise. 5) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected connections or anomalous DHCP-related requests. 6) Consider replacing affected devices with models from vendors with a stronger security track record if patches are not forthcoming. 7) Educate users and administrators about the risks and signs of exploitation to enable rapid detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-12T17:17:00.643Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68743e33a83201eaacbf59d1
Added to database: 7/13/2025, 11:16:03 PM
Last enriched: 7/13/2025, 11:31:07 PM
Last updated: 7/15/2025, 8:32:35 PM
Views: 6
Related Threats
CVE-2025-6981: CWE-863 Incorrect Authorization in GitHub Enterprise Server
MediumCVE-2025-49841: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
HighCVE-2025-49840: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
HighCVE-2025-30761: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. in Oracle Corporation Oracle Java SE
MediumCVE-2025-49836: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RVC-Boss GPT-SoVITS
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.