Skip to main content

CVE-2025-7596: Stack-based Buffer Overflow in Tenda FH1205

High
VulnerabilityCVE-2025-7596cvecve-2025-7596
Published: Mon Jul 14 2025 (07/14/2025, 10:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH1205

Description

A vulnerability was found in Tenda FH1205 2.0.0.7(775). It has been rated as critical. This issue affects the function formWifiExtraSet of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/14/2025, 11:01:10 UTC

Technical Analysis

CVE-2025-7596 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH1205 router, specifically affecting firmware version 2.0.0.7(775). The vulnerability resides in the function formWifiExtraSet within the /goform/WifiExtraSet endpoint. The issue arises due to improper handling of the wpapsk_crypto argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing the risk profile significantly. The CVSS 4.0 score of 8.7 (high severity) reflects the ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction required) and the potential for complete compromise of confidentiality, integrity, and availability of the affected device. Although no public exploits are currently known to be actively used in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. Given that Tenda FH1205 is a consumer-grade router, exploitation could allow attackers to gain control over network traffic, intercept sensitive data, or pivot into internal networks. The vulnerability's presence in the Wi-Fi configuration interface suggests that attackers might leverage it to alter wireless security settings or disrupt wireless connectivity.

Potential Impact

For European organizations, especially small and medium enterprises or home offices relying on Tenda FH1205 routers, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized network access, interception of confidential communications, and disruption of business operations due to denial of service. Compromise of the router could also facilitate lateral movement within corporate networks, potentially exposing sensitive data or critical infrastructure. Given the increasing reliance on remote work and wireless connectivity in Europe, the impact extends beyond individual devices to organizational cybersecurity posture. Additionally, critical sectors such as healthcare, finance, and government entities using these routers in branch offices or remote locations could face heightened risks of espionage or sabotage. The lack of a patch at the time of disclosure further exacerbates the threat, necessitating immediate mitigation to prevent exploitation.

Mitigation Recommendations

Organizations should first identify any Tenda FH1205 devices running firmware version 2.0.0.7(775) within their networks. Since no official patch is currently available, immediate mitigation steps include isolating affected devices from critical network segments and restricting remote access to the router’s management interfaces, especially the /goform/WifiExtraSet endpoint. Network-level controls such as firewall rules should block unsolicited inbound traffic targeting the router’s management ports. Employing network segmentation to separate IoT and consumer-grade devices from sensitive corporate resources can limit potential lateral movement. Monitoring network traffic for unusual activity or attempts to exploit the wpapsk_crypto parameter is advisable. Organizations should also engage with Tenda support channels to obtain firmware updates or advisories and plan for prompt patch deployment once available. As a longer-term strategy, replacing vulnerable devices with routers from vendors with robust security update policies is recommended to reduce exposure to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T13:09:16.337Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874dfeba83201eaacc50aaa

Added to database: 7/14/2025, 10:46:03 AM

Last enriched: 7/14/2025, 11:01:10 AM

Last updated: 7/16/2025, 7:23:53 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats