CVE-2025-7597

| EUVD-2025-21340 HIGH
2025-07-14 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:43 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:43 euvd
EUVD-2025-21340
PoC Detected
Jul 15, 2025 - 18:27 vuln.today
Public exploit code
CVE Published
Jul 14, 2025 - 11:15 nvd
HIGH 8.8

Description

A vulnerability classified as critical has been found in Tenda AX1803 1.0.0.1. Affected is the function formSetMacFilterCfg of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7597 is a critical stack-based buffer overflow vulnerability in Tenda AX1803 router firmware (version 1.0.0.1) affecting the MAC filter configuration function. An authenticated attacker can remotely exploit this via the deviceList parameter to achieve remote code execution with full system compromise (confidentiality, integrity, availability). A public exploit has been disclosed and the vulnerability may be actively exploited.

Technical Context

The vulnerability exists in the formSetMacFilterCfg function within the /goform/setMacFilterCfg web interface handler on Tenda AX1803 routers. The root cause is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), specifically a stack-based buffer overflow. The deviceList parameter lacks proper bounds checking when processed by the CGI handler, allowing an attacker to write beyond allocated stack memory. This is a classic memory safety issue in embedded device firmware, likely written in C/C++ without modern compiler protections or runtime bounds checking. The attack surface is the web management interface accessible after authentication, making it part of the device's HTTP server component.

Affected Products

Tenda AX1803 firmware version 1.0.0.1 and potentially earlier versions. The affected device is a dual-band AC router (AX1803 designation suggests AC1200/similar specs). CPE would be: cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1:*:*:*:*:*:*:*. The vulnerability affects the web-based management interface accessible on the LAN/WAN depending on configuration. Other Tenda AX and router models with similar code architecture may be vulnerable; Tenda has historically had multiple CGI handler vulnerabilities in similar product lines.

Remediation

Immediate remediation options: (1) **Firmware patch**: Check Tenda's support website for AX1803 firmware updates newer than 1.0.0.1. Apply the latest available firmware version immediately. (2) **Access controls**: Restrict access to the web management interface (typically port 80/443) using firewall rules—disable WAN access if not required, limit LAN access to trusted systems. (3) **Credential hardening**: Change default admin credentials immediately if not already done. (4) **Network segmentation**: Isolate router management traffic from general user network traffic. (5) **Vendor contact**: Contact Tenda support to confirm patch availability timeline if not yet released. (6) **Temporary mitigation**: If patching is delayed, disable remote management access and restrict local access to trusted administrators only. Note: Tenda devices often have slow patching cycles; end-of-life devices may not receive patches.

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +44
POC: +20

Share

CVE-2025-7597 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy