Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 12 |
CVE-ID | CVE-2025-7794 CVE-2025-7805 CVE-2025-7807 CVE-2025-7806 CVE-2025-7796 CVE-2025-7434 CVE-2025-7506 CVE-2025-7505 CVE-2025-7747 CVE-2025-7792 CVE-2025-7795 CVE-2025-7793 |
CWE-ID | CWE-121 CWE-119 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #2 is available. Public exploit code for vulnerability #3 is available. Public exploit code for vulnerability #5 is available. Public exploit code for vulnerability #6 is available. Public exploit code for vulnerability #7 is available. Public exploit code for vulnerability #8 is available. Public exploit code for vulnerability #9 is available. Public exploit code for vulnerability #10 is available. Public exploit code for vulnerability #11 is available. Public exploit code for vulnerability #12 is available. |
Vulnerable software |
FH451 Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Shenzhen Tenda Technology Co.,Ltd. |
Security Bulletin
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU113120
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7794
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "fromNatStaticSetting" function in the /goform/NatStaticSetting file. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromNatStaticSetting.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromNatStaticSetting.md#poc
https://vuldb.com/?ctiid.316855
https://vuldb.com/?id.316855
https://vuldb.com/?submit.616318
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113136
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7805
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the delno parameter in the fromPptpUserSetting function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserSetting.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserSetting.md#poc
https://vuldb.com/?ctiid.316881
https://vuldb.com/?id.316881
https://vuldb.com/?submit.616347
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113135
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7807
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Go parameter in the fromSafeUrlFilter function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeUrlFilter_Go.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeUrlFilter_page.md
https://vuldb.com/?ctiid.316883
https://vuldb.com/?id.316883
https://vuldb.com/?submit.616350
https://vuldb.com/?submit.616352
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113134
Risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-7806
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Go parameter in the fromSafeClientFilter function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeClientFilter_Go.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeClientFilter_page.md
https://vuldb.com/?ctiid.316882
https://vuldb.com/?id.316882
https://vuldb.com/?submit.616348
https://vuldb.com/?submit.616349
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113133
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7796
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the username parameter in the fromPptpUserAdd function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserAdd.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserAdd.md#poc
https://vuldb.com/?ctiid.316857
https://vuldb.com/?id.316857
https://vuldb.com/?submit.616345
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113131
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7434
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "fromAddressNat" function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/zezhifu1/cve_report/blob/main/FH451/fromAddressNat.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromAddressNat.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromAddressNat.md#payload
https://vuldb.com/?ctiid.316004
https://vuldb.com/?id.316004
https://vuldb.com/?submit.609058
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113129
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7506
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the fromNatlimit function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/zezhifu1/cve_report/blob/main/FH451/fromNatlimit.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromNatlimit.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromNatlimit.md#payload
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromNatlimit.md#payload
https://vuldb.com/?ctiid.316189
https://vuldb.com/?id.316189
https://vuldb.com/?submit.611505
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113128
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7505
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the frmL7ProtForm function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md#payload
https://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md#payload
https://vuldb.com/?ctiid.316188
https://vuldb.com/?id.316188
https://vuldb.com/?submit.611504
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113127
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7747
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the fromWizardHandle function. A remote user can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md
https://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md#payload
https://vuldb.com/?ctiid.316737
https://vuldb.com/?id.316737
https://vuldb.com/?submit.615487
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113126
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7792
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the page parameter in the formSafeEmailFilter function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/panda666-888/vuls/blob/main/tenda/fh451/formSafeEmailFilter.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formSafeEmailFilter.md#poc
https://vuldb.com/?ctiid.316853
https://vuldb.com/?id.316853
https://vuldb.com/?submit.616316
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113124
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7795
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the page parameter in the fromP2pListFilter function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromP2pListFilter.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromP2pListFilter.md#poc
https://vuldb.com/?ctiid.316856
https://vuldb.com/?id.316856
https://vuldb.com/?submit.616344
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU113121
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2025-7793
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the webSiteId parameter in the formWebTypeLibrary function. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsFH451: 1.0.0.9
CPE2.3 External linkshttps://github.com/panda666-888/vuls/blob/main/tenda/fh451/formWebTypeLibrary.md
https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formWebTypeLibrary.md#poc
https://vuldb.com/?ctiid.316854
https://vuldb.com/?id.316854
https://vuldb.com/?submit.616317
https://www.tenda.com.cn/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.