CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability was found in Tenda FH451 up to 1.0.0.9 and classified as critical. Affected by this issue is the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7434 is a critical stack-based buffer overflow vulnerability in Tenda FH451 wireless routers (versions up to 1.0.0.9) affecting the POST request handler for the /goform/addressNat endpoint. An authenticated remote attacker can exploit improper input validation on the 'page' parameter to overflow the stack, achieving arbitrary code execution with full system compromise (confidentiality, integrity, and availability impact). Public exploit code exists and the vulnerability may be actively exploited in the wild.
Technical Context
This vulnerability exists in the Tenda FH451 router's web management interface, specifically in the fromAddressNat function responsible for handling NAT (Network Address Translation) address configuration. The affected component is a POST request handler that processes user-supplied input parameters without adequate bounds checking. CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) represents a classic buffer overflow condition where input data exceeds allocated stack memory, overwriting adjacent memory regions including function return addresses and local variables. The vulnerability is triggered when the 'page' parameter in a POST request to /goform/addressNat exceeds expected buffer limits, allowing stack memory corruption. This affects embedded Linux-based router firmware, where the web interface typically runs with elevated privileges.
Affected Products
Tenda FH451 wireless router, firmware versions up to and including 1.0.0.9. CPE designation: cpe:2.3:o:tenda:fh451_firmware:*:*:*:*:*:*:*:* (versions <=1.0.0.9). The FH451 is a wireless router commonly deployed in small office/home office (SOHO) environments. All previously released firmware versions from initial release through 1.0.0.9 are affected; later firmware versions (1.0.1.0 and above if available) may contain patches but require verification from Tenda.
Remediation
Immediate actions: (1) Upgrade Tenda FH451 firmware to version 1.0.1.0 or later (check Tenda support portal for availability and release notes). (2) Until patched, implement network-level mitigations: restrict access to router web management interface (port 80/443) using firewall rules, disable remote management features if enabled, and segment router administration to trusted networks only. (3) Reset router to factory defaults and immediately change default administrative credentials to strong, unique passwords. (4) Monitor router logs for suspicious POST requests to /goform/addressNat endpoint. (5) Contact Tenda support ([email protected]) for patch availability timelines if version 1.0.1.0 is unavailable. (6) Consider replacement with devices from vendors demonstrating timely security updates if Tenda patches are delayed beyond 30 days.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21101