CVE-2025-45513
📋 TL;DR
Tenda FH451 router firmware version V1.0.0.9 contains a stack overflow vulnerability in the P2pListFilter function. This allows remote attackers to execute arbitrary code or cause denial of service. Anyone using the affected router firmware is vulnerable.
💻 Affected Systems
- Tenda FH451 router
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete router compromise, credential theft, network pivoting, and persistent backdoor installation.
Likely Case
Router crash/reboot causing denial of service, potentially requiring physical reset.
If Mitigated
Limited impact if router is behind firewall with restricted WAN access and proper network segmentation.
🎯 Exploit Status
Public GitHub repository contains vulnerability details and likely exploitation code. CVSS 9.8 suggests trivial exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: Yes
Instructions:
1. Check Tenda support site for firmware updates
2. If update available, download and flash via web interface
3. Factory reset after update
4. Reconfigure settings
🔧 Temporary Workarounds
Disable P2P features
allTurn off P2P/UPnP functionality in router settings
Network segmentation
allIsolate router management interface from user networks
🧯 If You Can't Patch
- Replace router with different model/brand
- Place router behind firewall with strict inbound rules
🔍 How to Verify
Check if Vulnerable:
Check router web interface → System Status → Firmware Version. If version is V1.0.0.9, you are vulnerable.
Check Version:
curl -s http://router-ip/login/Auth | grep Firmware
Verify Fix Applied:
After updating, verify firmware version is newer than V1.0.0.9
📡 Detection & Monitoring
Log Indicators:
- Multiple connection attempts to router management interface
- Router crash/reboot logs
- Unusual P2P traffic patterns
Network Indicators:
- Exploit payload patterns in HTTP requests to router
- Sudden router unresponsiveness
SIEM Query:
source="router.log" AND ("crash" OR "reboot" OR "P2pListFilter")