CVE-2025-7529

| EUVD-2025-21256 HIGH
2025-07-13 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21256
PoC Detected
Jul 16, 2025 - 14:56 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 12:15 nvd
HIGH 8.8

Description

A vulnerability classified as critical was found in Tenda FH1202 1.2.0.14(408). Affected by this vulnerability is the function fromNatlimit of the file /goform/Natlimit. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7529 is a critical stack-based buffer overflow vulnerability in Tenda FH1202 firmware version 1.2.0.14(408) that allows authenticated remote attackers to achieve complete system compromise through manipulation of the 'page' parameter in the /goform/Natlimit endpoint. With a CVSS score of 8.8, public exploit disclosure, and confirmation of active exploitation potential, this vulnerability poses significant real-world risk to deployed Tenda router installations.

Technical Context

The vulnerability exists in the fromNatlimit function within the Tenda FH1202 router's web management interface. This is a stack-based buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) caused by insufficient input validation on the 'page' parameter. The affected endpoint /goform/Natlimit processes NAT (Network Address Translation) limit configuration requests. Tenda routers are embedded Linux-based devices running proprietary firmware; the vulnerability likely stems from unsafe C string handling (strcpy, sprintf, or similar) in the CGI handler without proper bounds checking. CPE: cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\(408\):*:*:*:*:*:*:* (firmware) and cpe:2.3:h:tenda:fh1202:*:*:*:*:*:*:*:* (hardware). The stack overflow allows arbitrary code execution in the context of the web service process, typically running with elevated privileges on embedded devices.

Affected Products

[{'vendor': 'Tenda', 'product': 'FH1202', 'affected_versions': ['1.2.0.14(408)'], 'confirmed_vulnerable_cpe': 'cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*', 'product_type': 'Wireless Router (300Mbps)', 'notes': 'Likely affects other 1.2.0.x versions; version scope requires vendor confirmation'}]

Remediation

[{'type': 'Patch', 'action': 'Contact Tenda support or check https://www.tenda.com.cn/ for firmware updates beyond 1.2.0.14(408). Apply latest stable firmware release for FH1202.', 'priority': 'CRITICAL - Apply immediately'}, {'type': 'Workaround', 'action': "Restrict access to the router's web management interface (typically port 80/443) at the network boundary. Disable WAN-side access to the web interface if possible (check router settings under 'Remote Management' or equivalent). Use a VPN or bastion host for legitimate administrative access.", 'priority': 'IMMEDIATE - Deploy if patching is delayed'}, {'type': 'Mitigation', 'action': 'Change default router credentials immediately. Implement network segmentation to limit access to administrative interfaces. Monitor for suspicious requests to /goform/Natlimit endpoint in access logs.', 'priority': 'HIGH - Implement in parallel with other controls'}, {'type': 'Detection', 'action': "Monitor HTTP POST requests to /goform/Natlimit with unusually long 'page' parameter values (>512 bytes). Log and alert on such requests. Review router access logs for unauthorized administrative access.", 'priority': 'MEDIUM - Deploy logging rules'}]

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: +20

Share

CVE-2025-7529 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy