Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7596: Stack-based Buffer Overflow in Tenda FH1205

0
High
VulnerabilityCVE-2025-7596cvecve-2025-7596
Published: Mon Jul 14 2025 (07/14/2025, 10:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1205

Description

A vulnerability was found in Tenda FH1205 2.0.0.7(775). It has been rated as critical. This issue affects the function formWifiExtraSet of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/14/2025, 11:01:10 UTC

Technical Analysis

CVE-2025-7596 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH1205 router, specifically affecting firmware version 2.0.0.7(775). The vulnerability resides in the function formWifiExtraSet within the /goform/WifiExtraSet endpoint. The issue arises due to improper handling of the wpapsk_crypto argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing the risk profile significantly. The CVSS 4.0 score of 8.7 (high severity) reflects the ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction required) and the potential for complete compromise of confidentiality, integrity, and availability of the affected device. Although no public exploits are currently known to be actively used in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. Given that Tenda FH1205 is a consumer-grade router, exploitation could allow attackers to gain control over network traffic, intercept sensitive data, or pivot into internal networks. The vulnerability's presence in the Wi-Fi configuration interface suggests that attackers might leverage it to alter wireless security settings or disrupt wireless connectivity.

Potential Impact

For European organizations, especially small and medium enterprises or home offices relying on Tenda FH1205 routers, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized network access, interception of confidential communications, and disruption of business operations due to denial of service. Compromise of the router could also facilitate lateral movement within corporate networks, potentially exposing sensitive data or critical infrastructure. Given the increasing reliance on remote work and wireless connectivity in Europe, the impact extends beyond individual devices to organizational cybersecurity posture. Additionally, critical sectors such as healthcare, finance, and government entities using these routers in branch offices or remote locations could face heightened risks of espionage or sabotage. The lack of a patch at the time of disclosure further exacerbates the threat, necessitating immediate mitigation to prevent exploitation.

Mitigation Recommendations

Organizations should first identify any Tenda FH1205 devices running firmware version 2.0.0.7(775) within their networks. Since no official patch is currently available, immediate mitigation steps include isolating affected devices from critical network segments and restricting remote access to the router’s management interfaces, especially the /goform/WifiExtraSet endpoint. Network-level controls such as firewall rules should block unsolicited inbound traffic targeting the router’s management ports. Employing network segmentation to separate IoT and consumer-grade devices from sensitive corporate resources can limit potential lateral movement. Monitoring network traffic for unusual activity or attempts to exploit the wpapsk_crypto parameter is advisable. Organizations should also engage with Tenda support channels to obtain firmware updates or advisories and plan for prompt patch deployment once available. As a longer-term strategy, replacing vulnerable devices with routers from vendors with robust security update policies is recommended to reduce exposure to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T13:09:16.337Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874dfeba83201eaacc50aaa

Added to database: 7/14/2025, 10:46:03 AM

Last enriched: 7/14/2025, 11:01:10 AM

Last updated: 10/15/2025, 4:16:53 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats