CVE-2025-7794

8.8 HIGH

📋 TL;DR

A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the fromNatStaticSetting function. This affects Tenda FH451 routers running firmware version 1.0.0.9. Successful exploitation could lead to complete device compromise.

💻 Affected Systems

Products:
  • Tenda FH451
Versions: 1.0.0.9
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface on port 80/443. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full router compromise, persistence installation, network traffic interception, and lateral movement to internal systems.

🟠

Likely Case

Router compromise leading to denial of service, credential theft, or use as a pivot point for internal network attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access, though internal threats remain if exploited from within network.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication, making internet-exposed devices immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any network user.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub. Exploitation requires sending crafted HTTP request to /goform/NatStaticSetting endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Check Tenda website for firmware updates. If update exists: 1. Download latest firmware from Tenda support site 2. Log into router admin interface 3. Navigate to System Tools > Firmware Upgrade 4. Upload and apply new firmware

🔧 Temporary Workarounds

Disable WAN access to management interface

all

Prevent external exploitation by blocking internet access to router admin interface

Router-specific: Disable 'Remote Management' in admin interface

Network segmentation

all

Isolate router management interface to separate VLAN with restricted access

🧯 If You Can't Patch

  • Replace affected devices with supported models from different vendors
  • Implement strict network access controls to limit who can reach router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools. If version is 1.0.0.9, device is vulnerable.

Check Version:

Router-specific: Check via web interface or use nmap -sV -p80,443 [router_ip] to identify service versions

Verify Fix Applied:

Verify firmware version has changed from 1.0.0.9 to a newer version after update.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /goform/NatStaticSetting with abnormal 'page' parameter values
  • Router crash/reboot logs
  • Unusual outbound connections from router

Network Indicators:

  • HTTP POST requests to router IP on port 80/443 with long 'page' parameter
  • Sudden changes in router configuration

SIEM Query:

source="router_logs" AND (uri="/goform/NatStaticSetting" AND (param_length("page")>100 OR param_contains("page", "\x90")))

🔗 References

📤 Share & Export