EUVD-2025-21255

| CVE-2025-7527 HIGH
2025-07-13 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21255
PoC Detected
Jul 16, 2025 - 14:57 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 11:15 nvd
HIGH 8.8

Description

A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

A critical stack-based buffer overflow vulnerability exists in Tenda FH1202 firmware version 1.2.0.14(408) affecting the /goform/AdvSetWan endpoint. An authenticated remote attacker can overflow the PPPOEPassword parameter to achieve arbitrary code execution with full system privileges (confidentiality, integrity, and availability compromise). Public exploit code is available and the vulnerability meets criteria for active exploitation risk.

Technical Context

The vulnerability resides in the fromAdvSetWan function within Tenda FH1202 router firmware, which processes WAN configuration parameters via HTTP POST requests to /goform/AdvSetWan. The PPPOEPassword parameter lacks proper input validation and length checking before being copied into a stack-allocated buffer, violating CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). Tenda FH1202 is a wireless router device running proprietary firmware. The affected CPE context is likely: cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*. Stack-based buffer overflows in embedded router firmware typically allow attackers to overwrite return addresses and execute shellcode within the kernel or privileged userland process context.

Affected Products

[{'vendor': 'Tenda', 'product': 'FH1202', 'affected_versions': ['1.2.0.14(408)'], 'device_type': 'Wireless Router', 'cpe': 'cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*', 'notes': 'Older wireless router model; unclear if newer firmware versions patched. Verify 1.2.0.15+ availability.'}]

Remediation

[{'type': 'Patch', 'action': "Upgrade Tenda FH1202 firmware to version 1.2.0.15 or later (if available). Check Tenda's official support page for FH1202 security updates at https://www.tenda.com.cn/download/", 'priority': 'IMMEDIATE'}, {'type': 'Workaround - Network Segmentation', 'action': "Restrict administrative access to the router's web interface (port 80/443) to trusted internal networks only. Block external WAN access via firewall rules.", 'priority': 'HIGH'}, {'type': 'Workaround - Credential Management', 'action': 'Change default admin credentials to strong, unique passwords to reduce likelihood of authenticated exploit. However, this is NOT a complete mitigation as authenticated users on the network could still exploit.', 'priority': 'MEDIUM'}, {'type': 'Mitigation - Network Monitoring', 'action': 'Monitor for suspicious HTTP POST requests to /goform/AdvSetWan with unusually long PPPOEPassword values or binary payloads. Alert on firmware crashes/reboots.', 'priority': 'MEDIUM'}, {'type': 'Device Replacement', 'action': 'If patch unavailable, consider replacing FH1202 with newer router models from reputable vendors with active security support.', 'priority': 'HIGH'}]

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: +20

Share

EUVD-2025-21255 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy