CVE-2025-7544

was · was Multiple Products

A high-severity vulnerability, identified as CVE-2025-7544, has been discovered in multiple products from the vendor "was," with a specific Tenda router model confirmed to be affected.

Executive summary

A high-severity vulnerability, identified as CVE-2025-7544, has been discovered in multiple products from the vendor "was," with a specific Tenda router model confirmed to be affected. With a CVSS score of 8.8, this flaw could allow a remote attacker to gain complete control over vulnerable devices. Successful exploitation poses a significant risk of data theft, network disruption, and unauthorized access to internal corporate resources.

Vulnerability

This vulnerability allows for potential remote code execution on affected devices. Based on the high CVSS score and the nature of the affected product (a network router), the flaw likely resides in the device's web management interface. An unauthenticated attacker on the network could potentially send a specially crafted HTTP request, triggering a condition like a buffer overflow or command injection, to execute arbitrary code with administrative privileges on the device.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could have a severe impact on business operations. An attacker who gains control of a core network device can intercept sensitive network traffic, including credentials and confidential data, leading to a major data breach. Furthermore, the attacker could disrupt network connectivity, causing a denial of service, or use the compromised device as a beachhead to launch further attacks against other systems on the internal network, significantly escalating the scope of the incident.

Remediation

Immediate Action: Apply vendor security updates immediately across all affected devices. Prioritize patching for devices with management interfaces exposed to the internet. After patching, continue to monitor for any signs of exploitation attempts that may have occurred prior to remediation and review device access logs for any unauthorized activity.

Proactive Monitoring: Security teams should actively monitor network traffic to and from the management interfaces of affected devices for anomalous patterns or malicious payloads. In system and firewall logs, search for unauthorized access attempts from unfamiliar IP addresses, unexpected device reboots, or unexplained configuration changes, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Disable remote/WAN administration of the device, and restrict access to the management interface to a dedicated, trusted administrative VLAN or network segment. If possible, place a Web Application Firewall (WAF) in front of the device to inspect and block malicious requests targeting the vulnerability.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity of CVE-2025-7544, we recommend immediate and decisive action. Organizations using affected "was" products, including the specifically identified Tenda AC1206 model, must treat this as a critical priority. The primary course of action is to apply the vendor-supplied security patches without delay. While this CVE is not currently on the CISA KEV list, its 8.8 CVSS score indicates a critical risk profile that warrants an urgent response to prevent potential network compromise and data breaches.