CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, has been found in Tenda FH1205 2.0.0.7. This issue affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in Tenda FH1205 firmware version 2.0.0.7 affecting the lanMask parameter in the /goform/AdvSetLanip endpoint. An authenticated remote attacker can exploit this to achieve code execution with full system compromise (confidentiality, integrity, and availability impact). A public proof-of-concept exists, making this an active exploitation risk.
Technical Context
The vulnerability exists in the fromadvsetlanip function within Tenda's web-based router management interface. The vulnerable parameter 'lanMask' is not properly sanitized before being used in a buffer operation, triggering a classic stack-based or heap-based buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer). Tenda FH1205 is a residential WiFi router that uses embedded Linux with a web administration interface typically written in C/C++. The /goform/ endpoint pattern is common in Tenda devices for handling configuration changes. The buffer overflow allows an attacker to write beyond allocated memory boundaries, potentially overwriting function pointers, return addresses, or adjacent heap structures to gain remote code execution.
Affected Products
CPE: cpe:2.3:o:tenda:fh1205_firmware:2.0.0.7:*:*:*:*:*:*:* and cpe:2.3:h:tenda:fh1205:*:*:*:*:*:*:*:*. Affected Device: Tenda FH1205 (also marketed as FH1205v2.0 or similar variants). Affected Firmware Version: 2.0.0.7 explicitly. Other nearby versions (2.0.0.x series) are likely vulnerable due to shared codebases but require individual verification. No vendor advisory link provided in description; check Tenda's security portal or contact Tenda support directly at [email protected].
Remediation
Immediate actions: (1) If patch available: Upgrade to firmware version beyond 2.0.0.7 (check Tenda's official support page for FH1205). (2) If no patch: Disable remote management/WAN access to the web interface (set to LAN-only if available in UI). (3) Change default credentials and enforce strong passwords on router admin account. (4) Isolate affected routers on segregated networks if possible. (5) Monitor for unauthorized configuration changes or signs of compromise (unusual CPU/memory usage, unexpected outbound connections). (6) Check Tenda's official advisory at https://www.tenda.com.cn or contact their support for patch ETA. (7) Consider replacement with patched firmware version or alternative router if patch is not forthcoming. Temporary mitigation: Block WAN access to port 80/443 on the router's admin interface via firewall rules.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18368