CVE-2025-7795: Stack-based Buffer Overflow in Tenda FH451
A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. Affected by this issue is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7795 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH451 router, specifically affecting version 1.0.0.9. The flaw exists in the fromP2pListFilter function within the /goform/P2pListFilter endpoint. This vulnerability arises due to improper handling and validation of the 'page' argument, which an attacker can manipulate to overflow the stack buffer. Exploiting this vulnerability can allow a remote attacker to execute arbitrary code on the device without requiring user interaction or prior authentication, as the attack vector is network accessible (AV:N) and has low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (VC:H, VI:H, VA:H), meaning an attacker could potentially take full control of the router, intercept or manipulate network traffic, disrupt network services, or use the compromised device as a pivot point for further attacks within the network. Although no public exploits are currently known to be actively used in the wild, the exploit code has been disclosed, increasing the risk of imminent exploitation. The CVSS 4.0 base score is 8.7, reflecting a high severity level. The vulnerability does not require authentication or user interaction, which significantly raises the risk profile. Given the critical nature of the flaw and the widespread use of Tenda routers in various markets, this vulnerability represents a significant security risk to affected organizations and individuals.
Potential Impact
For European organizations, the impact of CVE-2025-7795 could be substantial. Tenda routers are commonly deployed in small and medium-sized enterprises (SMEs), home offices, and some branch office environments due to their cost-effectiveness and ease of use. A successful exploitation could lead to full compromise of the network perimeter device, enabling attackers to intercept sensitive communications, exfiltrate confidential data, disrupt business operations by causing denial of service, or establish persistent footholds for lateral movement within corporate networks. This is particularly concerning for sectors handling sensitive personal data under GDPR regulations, such as healthcare, finance, and legal services, where data breaches can result in severe regulatory penalties and reputational damage. Additionally, compromised routers could be leveraged in botnets to launch distributed denial-of-service (DDoS) attacks against critical infrastructure or other targets, indirectly affecting European digital services and infrastructure resilience. The lack of a patch at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts to prevent exploitation.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement several targeted mitigation strategies: 1) Network Segmentation: Isolate Tenda FH451 devices from critical internal networks to limit potential lateral movement if compromised. 2) Access Control: Restrict management interface access to trusted IP addresses only and disable remote management features if not required. 3) Traffic Filtering: Employ firewall rules to block unsolicited inbound traffic to the /goform/P2pListFilter endpoint or related services on the router. 4) Monitoring and Detection: Deploy network intrusion detection systems (NIDS) with signatures or heuristics capable of identifying exploitation attempts targeting this vulnerability. 5) Device Replacement: Where feasible, replace vulnerable Tenda FH451 routers with devices from vendors with timely security update practices. 6) Vendor Engagement: Engage with Tenda support channels to obtain information on forthcoming patches or firmware updates and apply them promptly once available. 7) Incident Response Preparedness: Prepare for potential compromise by ensuring robust backup procedures and incident response plans are in place to quickly remediate any breach resulting from exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7795: Stack-based Buffer Overflow in Tenda FH451
Description
A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. Affected by this issue is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7795 is a critical stack-based buffer overflow vulnerability identified in the Tenda FH451 router, specifically affecting version 1.0.0.9. The flaw exists in the fromP2pListFilter function within the /goform/P2pListFilter endpoint. This vulnerability arises due to improper handling and validation of the 'page' argument, which an attacker can manipulate to overflow the stack buffer. Exploiting this vulnerability can allow a remote attacker to execute arbitrary code on the device without requiring user interaction or prior authentication, as the attack vector is network accessible (AV:N) and has low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (VC:H, VI:H, VA:H), meaning an attacker could potentially take full control of the router, intercept or manipulate network traffic, disrupt network services, or use the compromised device as a pivot point for further attacks within the network. Although no public exploits are currently known to be actively used in the wild, the exploit code has been disclosed, increasing the risk of imminent exploitation. The CVSS 4.0 base score is 8.7, reflecting a high severity level. The vulnerability does not require authentication or user interaction, which significantly raises the risk profile. Given the critical nature of the flaw and the widespread use of Tenda routers in various markets, this vulnerability represents a significant security risk to affected organizations and individuals.
Potential Impact
For European organizations, the impact of CVE-2025-7795 could be substantial. Tenda routers are commonly deployed in small and medium-sized enterprises (SMEs), home offices, and some branch office environments due to their cost-effectiveness and ease of use. A successful exploitation could lead to full compromise of the network perimeter device, enabling attackers to intercept sensitive communications, exfiltrate confidential data, disrupt business operations by causing denial of service, or establish persistent footholds for lateral movement within corporate networks. This is particularly concerning for sectors handling sensitive personal data under GDPR regulations, such as healthcare, finance, and legal services, where data breaches can result in severe regulatory penalties and reputational damage. Additionally, compromised routers could be leveraged in botnets to launch distributed denial-of-service (DDoS) attacks against critical infrastructure or other targets, indirectly affecting European digital services and infrastructure resilience. The lack of a patch at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts to prevent exploitation.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement several targeted mitigation strategies: 1) Network Segmentation: Isolate Tenda FH451 devices from critical internal networks to limit potential lateral movement if compromised. 2) Access Control: Restrict management interface access to trusted IP addresses only and disable remote management features if not required. 3) Traffic Filtering: Employ firewall rules to block unsolicited inbound traffic to the /goform/P2pListFilter endpoint or related services on the router. 4) Monitoring and Detection: Deploy network intrusion detection systems (NIDS) with signatures or heuristics capable of identifying exploitation attempts targeting this vulnerability. 5) Device Replacement: Where feasible, replace vulnerable Tenda FH451 routers with devices from vendors with timely security update practices. 6) Vendor Engagement: Engage with Tenda support channels to obtain information on forthcoming patches or firmware updates and apply them promptly once available. 7) Incident Response Preparedness: Prepare for potential compromise by ensuring robust backup procedures and incident response plans are in place to quickly remediate any breach resulting from exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T07:51:31.614Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687a84eba83201eaacf54f32
Added to database: 7/18/2025, 5:31:23 PM
Last enriched: 7/18/2025, 5:46:13 PM
Last updated: 8/15/2025, 3:31:38 AM
Views: 28
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.