CVE-2025-7807
Published: 18 July 2025
Summary
CVE-2025-7807 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Tenda Fh451 Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 31.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through firmware patching directly eliminates the stack-based buffer overflow in the fromSafeUrlFilter function.
Information input validation ensures proper bounds checking on the Go/page argument to prevent triggering the stack buffer overflow.
Memory protection mechanisms like stack canaries and non-executable memory mitigate exploitation of the stack-based buffer overflow for arbitrary code execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in the web interface (/goform/SafeUrlFilter) of Tenda FH451 router firmware, remotely exploitable via manipulated 'Go/page' parameter, with public PoC, directly enables exploitation of a public-facing application.
NVD Description
A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. This issue affects the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. The manipulation of the argument Go/page leads to stack-based buffer overflow. The attack may be initiated…
more
remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-7807 is a critical stack-based buffer overflow vulnerability in the Tenda FH451 router running firmware version 1.0.0.9. The issue resides in the fromSafeUrlFilter function within the /goform/SafeUrlFilter file, where manipulation of the Go/page argument triggers the overflow. It carries a CVSS v3.1 base score of 8.8 and is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow). The vulnerability was published on 2025-07-18.
Attackers with network access and low privileges (PR:L) can exploit this remotely without user interaction (AC:L, UI:N), potentially achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). By sending crafted requests to the vulnerable endpoint, an attacker could overflow the stack, leading to arbitrary code execution on the device.
Advisories from VulDB (ctiid.316883, id.316883, submit.616350) document the vulnerability and its remote exploitability, while GitHub repositories provide proof-of-concept exploits demonstrating manipulation of the Go and page arguments in fromSafeUrlFilter. No specific patches or mitigations are detailed in the referenced sources.
The exploit has been publicly disclosed, with detailed PoC code available on GitHub, increasing the risk of real-world abuse against unpatched Tenda FH451 devices.
Details
- CWE(s)