CVE-2025-7792: Stack-based Buffer Overflow in Tenda FH451
A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7792 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH451 router, specifically affecting version 1.0.0.9. The vulnerability resides in the function formSafeEmailFilter within the /goform/SafeEmailFilter endpoint. An attacker can manipulate the 'page' argument passed to this function, causing a stack-based buffer overflow. This type of vulnerability occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and allowing arbitrary code execution. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 base score is 8.7, categorizing it as high severity. The vulnerability impacts confidentiality, integrity, and availability (all rated high in the CVSS vector), meaning an attacker could execute arbitrary code, potentially gaining control over the device, intercepting or manipulating network traffic, or causing denial of service. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of active exploitation. The lack of available patches or vendor mitigation guidance at the time of publication further elevates the threat level. Given the critical role routers play in network infrastructure, exploitation could serve as a foothold for lateral movement within networks or as a launch point for broader attacks.
Potential Impact
For European organizations, the exploitation of this vulnerability in Tenda FH451 routers could have severe consequences. Many small and medium enterprises (SMEs) and some home office setups use Tenda devices due to their cost-effectiveness and ease of deployment. A successful attack could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations. The compromise of network infrastructure devices like routers can undermine the confidentiality and integrity of corporate data, potentially leading to data breaches and regulatory non-compliance under GDPR. Additionally, compromised routers could be leveraged to launch further attacks such as man-in-the-middle (MITM), malware distribution, or participation in botnets, amplifying the impact beyond the initial target. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable devices across Europe without requiring physical access or user interaction.
Mitigation Recommendations
Given the absence of official patches at the time of disclosure, European organizations should implement immediate compensating controls. First, network segmentation should be enforced to isolate Tenda FH451 devices from critical assets and sensitive data. Access to the router's management interface should be restricted using firewall rules, allowing only trusted IP addresses to connect. Monitoring network traffic for unusual patterns or spikes can help detect exploitation attempts. Organizations should consider disabling or restricting the vulnerable /goform/SafeEmailFilter endpoint if possible, or applying custom firewall rules to block malicious payloads targeting the 'page' parameter. Regularly updating router firmware is essential once a patch is released. Additionally, organizations should conduct asset inventories to identify all Tenda FH451 devices and prioritize their remediation. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can provide early warning and automated blocking. Finally, educating IT staff about this vulnerability and encouraging vigilance against unusual router behavior will improve overall security posture.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Belgium
CVE-2025-7792: Stack-based Buffer Overflow in Tenda FH451
Description
A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7792 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH451 router, specifically affecting version 1.0.0.9. The vulnerability resides in the function formSafeEmailFilter within the /goform/SafeEmailFilter endpoint. An attacker can manipulate the 'page' argument passed to this function, causing a stack-based buffer overflow. This type of vulnerability occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and allowing arbitrary code execution. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 base score is 8.7, categorizing it as high severity. The vulnerability impacts confidentiality, integrity, and availability (all rated high in the CVSS vector), meaning an attacker could execute arbitrary code, potentially gaining control over the device, intercepting or manipulating network traffic, or causing denial of service. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of active exploitation. The lack of available patches or vendor mitigation guidance at the time of publication further elevates the threat level. Given the critical role routers play in network infrastructure, exploitation could serve as a foothold for lateral movement within networks or as a launch point for broader attacks.
Potential Impact
For European organizations, the exploitation of this vulnerability in Tenda FH451 routers could have severe consequences. Many small and medium enterprises (SMEs) and some home office setups use Tenda devices due to their cost-effectiveness and ease of deployment. A successful attack could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations. The compromise of network infrastructure devices like routers can undermine the confidentiality and integrity of corporate data, potentially leading to data breaches and regulatory non-compliance under GDPR. Additionally, compromised routers could be leveraged to launch further attacks such as man-in-the-middle (MITM), malware distribution, or participation in botnets, amplifying the impact beyond the initial target. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable devices across Europe without requiring physical access or user interaction.
Mitigation Recommendations
Given the absence of official patches at the time of disclosure, European organizations should implement immediate compensating controls. First, network segmentation should be enforced to isolate Tenda FH451 devices from critical assets and sensitive data. Access to the router's management interface should be restricted using firewall rules, allowing only trusted IP addresses to connect. Monitoring network traffic for unusual patterns or spikes can help detect exploitation attempts. Organizations should consider disabling or restricting the vulnerable /goform/SafeEmailFilter endpoint if possible, or applying custom firewall rules to block malicious payloads targeting the 'page' parameter. Regularly updating router firmware is essential once a patch is released. Additionally, organizations should conduct asset inventories to identify all Tenda FH451 devices and prioritize their remediation. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can provide early warning and automated blocking. Finally, educating IT staff about this vulnerability and encouraging vigilance against unusual router behavior will improve overall security posture.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T07:51:20.562Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687a76cea83201eaacf510fe
Added to database: 7/18/2025, 4:31:10 PM
Last enriched: 7/26/2025, 12:53:50 AM
Last updated: 8/18/2025, 1:22:23 AM
Views: 16
Related Threats
CVE-2025-55283: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aiven aiven-db-migrate
CriticalCVE-2025-55282: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aiven aiven-db-migrate
CriticalCVE-2025-54234: Server-Side Request Forgery (SSRF) (CWE-918) in Adobe ColdFusion
LowCVE-2025-3639: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Liferay Portal
LowCVE-2025-55288: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MGeurts genealogy
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.