CVE-2025-7792: Stack-based Buffer Overflow in Tenda FH451
A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7792 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH451 router, specifically affecting version 1.0.0.9. The vulnerability resides in the function formSafeEmailFilter within the /goform/SafeEmailFilter endpoint. An attacker can manipulate the 'page' argument passed to this function, causing a stack-based buffer overflow. This type of vulnerability occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and allowing arbitrary code execution. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 base score is 8.7, categorizing it as high severity. The vulnerability impacts confidentiality, integrity, and availability (all rated high in the CVSS vector), meaning an attacker could execute arbitrary code, potentially gaining control over the device, intercepting or manipulating network traffic, or causing denial of service. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of active exploitation. The lack of available patches or vendor mitigation guidance at the time of publication further elevates the threat level. Given the critical role routers play in network infrastructure, exploitation could serve as a foothold for lateral movement within networks or as a launch point for broader attacks.
Potential Impact
For European organizations, the exploitation of this vulnerability in Tenda FH451 routers could have severe consequences. Many small and medium enterprises (SMEs) and some home office setups use Tenda devices due to their cost-effectiveness and ease of deployment. A successful attack could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations. The compromise of network infrastructure devices like routers can undermine the confidentiality and integrity of corporate data, potentially leading to data breaches and regulatory non-compliance under GDPR. Additionally, compromised routers could be leveraged to launch further attacks such as man-in-the-middle (MITM), malware distribution, or participation in botnets, amplifying the impact beyond the initial target. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable devices across Europe without requiring physical access or user interaction.
Mitigation Recommendations
Given the absence of official patches at the time of disclosure, European organizations should implement immediate compensating controls. First, network segmentation should be enforced to isolate Tenda FH451 devices from critical assets and sensitive data. Access to the router's management interface should be restricted using firewall rules, allowing only trusted IP addresses to connect. Monitoring network traffic for unusual patterns or spikes can help detect exploitation attempts. Organizations should consider disabling or restricting the vulnerable /goform/SafeEmailFilter endpoint if possible, or applying custom firewall rules to block malicious payloads targeting the 'page' parameter. Regularly updating router firmware is essential once a patch is released. Additionally, organizations should conduct asset inventories to identify all Tenda FH451 devices and prioritize their remediation. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can provide early warning and automated blocking. Finally, educating IT staff about this vulnerability and encouraging vigilance against unusual router behavior will improve overall security posture.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Belgium
CVE-2025-7792: Stack-based Buffer Overflow in Tenda FH451
Description
A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7792 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH451 router, specifically affecting version 1.0.0.9. The vulnerability resides in the function formSafeEmailFilter within the /goform/SafeEmailFilter endpoint. An attacker can manipulate the 'page' argument passed to this function, causing a stack-based buffer overflow. This type of vulnerability occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and allowing arbitrary code execution. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 base score is 8.7, categorizing it as high severity. The vulnerability impacts confidentiality, integrity, and availability (all rated high in the CVSS vector), meaning an attacker could execute arbitrary code, potentially gaining control over the device, intercepting or manipulating network traffic, or causing denial of service. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of active exploitation. The lack of available patches or vendor mitigation guidance at the time of publication further elevates the threat level. Given the critical role routers play in network infrastructure, exploitation could serve as a foothold for lateral movement within networks or as a launch point for broader attacks.
Potential Impact
For European organizations, the exploitation of this vulnerability in Tenda FH451 routers could have severe consequences. Many small and medium enterprises (SMEs) and some home office setups use Tenda devices due to their cost-effectiveness and ease of deployment. A successful attack could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations. The compromise of network infrastructure devices like routers can undermine the confidentiality and integrity of corporate data, potentially leading to data breaches and regulatory non-compliance under GDPR. Additionally, compromised routers could be leveraged to launch further attacks such as man-in-the-middle (MITM), malware distribution, or participation in botnets, amplifying the impact beyond the initial target. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable devices across Europe without requiring physical access or user interaction.
Mitigation Recommendations
Given the absence of official patches at the time of disclosure, European organizations should implement immediate compensating controls. First, network segmentation should be enforced to isolate Tenda FH451 devices from critical assets and sensitive data. Access to the router's management interface should be restricted using firewall rules, allowing only trusted IP addresses to connect. Monitoring network traffic for unusual patterns or spikes can help detect exploitation attempts. Organizations should consider disabling or restricting the vulnerable /goform/SafeEmailFilter endpoint if possible, or applying custom firewall rules to block malicious payloads targeting the 'page' parameter. Regularly updating router firmware is essential once a patch is released. Additionally, organizations should conduct asset inventories to identify all Tenda FH451 devices and prioritize their remediation. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can provide early warning and automated blocking. Finally, educating IT staff about this vulnerability and encouraging vigilance against unusual router behavior will improve overall security posture.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T07:51:20.562Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687a76cea83201eaacf510fe
Added to database: 7/18/2025, 4:31:10 PM
Last enriched: 7/26/2025, 12:53:50 AM
Last updated: 11/11/2025, 11:16:31 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7633: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Exchange Reporter Plus
HighCVE-2025-7632: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Exchange Reporter Plus
HighCVE-2025-7430: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Exchange Reporter Plus
HighCisco Finds Open-Weight AI Models Easy to Exploit in Long Conversations
HighCVE-2025-7429: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Exchange Reporter Plus
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.