CVE-2025-7468
has · has Multiple Products
A high-severity vulnerability has been discovered in multiple "has" products, specifically identified in the Tenda FH1201 router.
Executive summary
A high-severity vulnerability has been discovered in multiple "has" products, specifically identified in the Tenda FH1201 router. This flaw could allow a remote, unauthenticated attacker to gain complete control over an affected device, potentially leading to a full network compromise, data theft, or disruption of critical services.
Vulnerability
The vulnerability is a stack-based buffer overflow within the web server component of the affected devices. A specially crafted, unauthenticated HTTP request sent to the device's management interface can trigger this overflow. By sending an overly long string in a specific request parameter, a remote attacker can overwrite the stack, corrupt memory, and execute arbitrary code with root privileges on the underlying operating system, resulting in a full compromise of the device.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could lead to a complete compromise of the affected network devices. An attacker could intercept sensitive data passing through the router, pivot to attack other systems on the internal network, disrupt internet connectivity, or use the compromised device as part of a larger botnet for launching denial-of-service attacks. The potential business impact includes data breaches, significant operational downtime, reputational damage, and the cost associated with incident response and recovery.
Remediation
Immediate Action: Organizations must immediately apply the security updates provided by the vendor to all affected devices. After patching, it is crucial to monitor systems for any signs of post-remediation exploitation attempts and review historical access logs for indicators of compromise (IoC) that may have occurred prior to patching.
Proactive Monitoring: Security teams should proactively monitor network traffic to and from the management interfaces of these devices. Look for unusual or malformed HTTP requests, unexpected outbound connections from the devices, and spikes in traffic. In system logs, search for evidence of web server crashes, unexpected reboots, or the execution of unauthorized processes.
Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls to reduce the attack surface. Restrict network access to the device's web management interface to a trusted internal network or specific IP addresses. If remote management is necessary, ensure it is done over a secure channel like a VPN and disable public-facing (WAN) administration features.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the high severity (CVSS 8.8) of this vulnerability and the potential for complete remote system compromise without authentication, we strongly recommend that all organizations using affected products apply the vendor-provided patches with the highest priority. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its characteristics make it an attractive target for threat actors. Proactive patching is the most effective defense to prevent potential network breaches, data loss, and operational disruption.