CVE-2025-14994

8.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Tenda FH1201 and FH1206 routers allows remote attackers to execute arbitrary code by manipulating the webSiteId parameter in HTTP requests. This affects devices running vulnerable firmware versions, potentially giving attackers full control over the router. The exploit is publicly available and can be performed without authentication.

💻 Affected Systems

Products:
  • Tenda FH1201
  • Tenda FH1206
Versions: 1.2.0.14(408) and 1.2.0.8(8155)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with web management interface exposed to network are vulnerable. The vulnerability is in the HTTP request handler component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network traffic interception, credential theft, and lateral movement into connected networks.

🟠

Likely Case

Router takeover allowing attackers to modify DNS settings, intercept traffic, deploy malware to connected devices, or create persistent backdoors.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering or if exploit attempts are detected and blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available on GitHub. The vulnerability requires sending a specially crafted HTTP request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Tenda's official website for firmware updates. If available, download the latest firmware and upload it via the router's web interface under System Tools > Firmware Upgrade.

🔧 Temporary Workarounds

Network Segmentation and Access Control

all

Restrict access to router management interface using firewall rules

Disable Remote Management

all

Turn off remote management feature if enabled

🧯 If You Can't Patch

  • Replace affected routers with supported models from different vendors
  • Place routers behind dedicated firewalls with strict inbound filtering rules

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status > Device Information

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify firmware version has been updated to a version later than the affected ones

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/webtypelibrary with long webSiteId parameters
  • Multiple failed authentication attempts followed by buffer overflow patterns

Network Indicators:

  • HTTP traffic to router management interface containing unusually long parameter values
  • Traffic patterns matching known exploit payloads

SIEM Query:

source="router_logs" AND (url="/goform/webtypelibrary" AND parameter_length>1000) OR (event_type="buffer_overflow" AND device_model="FH1201" OR device_model="FH1206")

🔗 References

📤 Share & Export