Skip to main content

CVE-2025-7598: Stack-based Buffer Overflow in Tenda AX1803

High
VulnerabilityCVE-2025-7598cvecve-2025-7598
Published: Mon Jul 14 2025 (07/14/2025, 11:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AX1803

Description

A vulnerability classified as critical was found in Tenda AX1803 1.0.0.1. Affected by this vulnerability is the function formSetWifiMacFilterCfg of the file /goform/setWifiFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/14/2025, 11:31:09 UTC

Technical Analysis

CVE-2025-7598 is a critical stack-based buffer overflow vulnerability identified in the Tenda AX1803 router, specifically in firmware version 1.0.0.1. The flaw exists in the function formSetWifiMacFilterCfg within the /goform/setWifiFilterCfg endpoint. This function processes the deviceList argument, which, when manipulated by an attacker, leads to a stack-based buffer overflow condition. This type of vulnerability allows an attacker to overwrite parts of the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS 4.0 base score is 8.7, indicating a high severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits are currently reported in the wild, the public disclosure of the exploit code raises the likelihood of imminent exploitation. The vulnerability affects only the specified firmware version 1.0.0.1 of the Tenda AX1803 router, a device commonly used in home and small office environments for wireless networking. The absence of official patches or mitigation guidance from the vendor at this time further exacerbates the risk. Given the nature of the vulnerability, successful exploitation could allow attackers to gain control over the device, intercept or manipulate network traffic, and pivot into internal networks, posing significant security risks.

Potential Impact

For European organizations, the exploitation of CVE-2025-7598 could have severe consequences, especially for small and medium enterprises (SMEs) and home office setups relying on Tenda AX1803 routers. Compromise of these devices could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of network availability. This is particularly critical for organizations handling personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. Additionally, compromised routers could be leveraged as entry points for broader attacks, including lateral movement to more critical infrastructure. The high impact on confidentiality, integrity, and availability means that sensitive communications and business operations could be severely affected. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these routers are deployed without adequate network segmentation or monitoring.

Mitigation Recommendations

Given the lack of official patches, European organizations should immediately assess their network environments for the presence of Tenda AX1803 routers running firmware version 1.0.0.1. Network administrators should isolate these devices from critical network segments and restrict remote access to the router management interfaces, ideally limiting access to trusted IP addresses or internal networks only. Implementing strict firewall rules to block access to the /goform/setWifiFilterCfg endpoint can help mitigate exploitation attempts. Network monitoring should be enhanced to detect anomalous traffic patterns or attempts to exploit this vulnerability. Organizations should also consider replacing vulnerable devices with updated hardware or firmware versions once available. Additionally, educating users about the risks and encouraging the use of VPNs or secure network configurations can reduce exposure. Finally, maintaining an inventory of network devices and applying timely updates when patches are released is essential to long-term risk management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T13:13:20.225Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874e6f4a83201eaacc53dd9

Added to database: 7/14/2025, 11:16:04 AM

Last enriched: 7/14/2025, 11:31:09 AM

Last updated: 7/16/2025, 8:33:40 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats