Multiple vulnerabilities in Tenda FH451



Risk Medium
Patch available NO
Number of vulnerabilities 12
CVE-ID CVE-2025-7794
CVE-2025-7805
CVE-2025-7807
CVE-2025-7806
CVE-2025-7796
CVE-2025-7434
CVE-2025-7506
CVE-2025-7505
CVE-2025-7747
CVE-2025-7792
CVE-2025-7795
CVE-2025-7793
CWE-ID CWE-121
CWE-119
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #3 is available.
Public exploit code for vulnerability #5 is available.
Public exploit code for vulnerability #6 is available.
Public exploit code for vulnerability #7 is available.
Public exploit code for vulnerability #8 is available.
Public exploit code for vulnerability #9 is available.
Public exploit code for vulnerability #10 is available.
Public exploit code for vulnerability #11 is available.
Public exploit code for vulnerability #12 is available.
Vulnerable software
FH451
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Shenzhen Tenda Technology Co.,Ltd.

Security Bulletin

This security bulletin contains information about 12 vulnerabilities.

1) Stack-based buffer overflow

EUVDB-ID: #VU113120

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7794

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the "fromNatStaticSetting" function in the /goform/NatStaticSetting file. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromNatStaticSetting.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromNatStaticSetting.md#poc
https://vuldb.com/?ctiid.316855
https://vuldb.com/?id.316855
https://vuldb.com/?submit.616318
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Stack-based buffer overflow

EUVDB-ID: #VU113136

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7805

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the delno parameter in the fromPptpUserSetting function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserSetting.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserSetting.md#poc
https://vuldb.com/?ctiid.316881
https://vuldb.com/?id.316881
https://vuldb.com/?submit.616347
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

3) Stack-based buffer overflow

EUVDB-ID: #VU113135

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7807

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the Go parameter in the fromSafeUrlFilter function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeUrlFilter_Go.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeUrlFilter_page.md
https://vuldb.com/?ctiid.316883
https://vuldb.com/?id.316883
https://vuldb.com/?submit.616350
https://vuldb.com/?submit.616352
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

4) Stack-based buffer overflow

EUVDB-ID: #VU113134

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-7806

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the Go parameter in the fromSafeClientFilter function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeClientFilter_Go.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeClientFilter_page.md
https://vuldb.com/?ctiid.316882
https://vuldb.com/?id.316882
https://vuldb.com/?submit.616348
https://vuldb.com/?submit.616349
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Stack-based buffer overflow

EUVDB-ID: #VU113133

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7796

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the username parameter in the fromPptpUserAdd function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserAdd.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserAdd.md#poc
https://vuldb.com/?ctiid.316857
https://vuldb.com/?id.316857
https://vuldb.com/?submit.616345
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

6) Stack-based buffer overflow

EUVDB-ID: #VU113131

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7434

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the "fromAddressNat" function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/zezhifu1/cve_report/blob/main/FH451/fromAddressNat.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromAddressNat.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromAddressNat.md#payload
https://vuldb.com/?ctiid.316004
https://vuldb.com/?id.316004
https://vuldb.com/?submit.609058
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

7) Stack-based buffer overflow

EUVDB-ID: #VU113129

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7506

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fromNatlimit function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/zezhifu1/cve_report/blob/main/FH451/fromNatlimit.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromNatlimit.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromNatlimit.md#payload
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromNatlimit.md#payload
https://vuldb.com/?ctiid.316189
https://vuldb.com/?id.316189
https://vuldb.com/?submit.611505
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

8) Stack-based buffer overflow

EUVDB-ID: #VU113128

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7505

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the frmL7ProtForm function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md#payload
https://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md#payload
https://vuldb.com/?ctiid.316188
https://vuldb.com/?id.316188
https://vuldb.com/?submit.611504
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

9) Buffer overflow

EUVDB-ID: #VU113127

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7747

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fromWizardHandle function. A remote user can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md#payload
https://vuldb.com/?ctiid.316737
https://vuldb.com/?id.316737
https://vuldb.com/?submit.615487
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

10) Stack-based buffer overflow

EUVDB-ID: #VU113126

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7792

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the page parameter in the formSafeEmailFilter function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formSafeEmailFilter.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formSafeEmailFilter.md#poc
https://vuldb.com/?ctiid.316853
https://vuldb.com/?id.316853
https://vuldb.com/?submit.616316
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

11) Stack-based buffer overflow

EUVDB-ID: #VU113124

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7795

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the page parameter in the fromP2pListFilter function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromP2pListFilter.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromP2pListFilter.md#poc
https://vuldb.com/?ctiid.316856
https://vuldb.com/?id.316856
https://vuldb.com/?submit.616344
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

12) Stack-based buffer overflow

EUVDB-ID: #VU113121

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7793

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the webSiteId parameter in the formWebTypeLibrary function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

FH451: 1.0.0.9

CPE2.3 External links

https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formWebTypeLibrary.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formWebTypeLibrary.md#poc
https://vuldb.com/?ctiid.316854
https://vuldb.com/?id.316854
https://vuldb.com/?submit.616317
https://www.tenda.com.cn/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###