CVE-2025-7548

Tenda · Tenda Multiple Products (including FH1201)

A high-severity vulnerability has been identified in multiple Tenda products, notably the FH1201 router.

Executive summary

A high-severity vulnerability has been identified in multiple Tenda products, notably the FH1201 router. This flaw could allow a remote, unauthenticated attacker to take complete control of affected devices, potentially leading to data theft, network disruption, or using the compromised device to attack other systems. Organizations using affected Tenda products are at significant risk and should apply vendor patches immediately.

Vulnerability

This vulnerability is a remote command injection flaw in the device's web-based management interface. An unauthenticated attacker can send a specially crafted HTTP request to the device, injecting arbitrary operating system commands. These commands are executed on the underlying system with root privileges, granting the attacker full control over the device. Exploitation does not require any user interaction and can be performed remotely over the network.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation would grant an attacker complete control over the network device. This could lead to severe business consequences, including the interception of sensitive network traffic, unauthorized access to internal network segments, and denial of service (DoS) conditions. Compromised routers could also be incorporated into a botnet for use in larger-scale attacks against other organizations, causing significant reputational damage.

Remediation

Immediate Action: Apply vendor security updates immediately. The vendor has released patched firmware versions that address this vulnerability. After applying the update, it is critical to review device configurations and access logs for any signs of prior compromise.

Proactive Monitoring: Monitor for exploitation attempts by reviewing web server access logs on the device's management interface for unusual or malformed requests. Network traffic should be monitored for unexpected outbound connections from the routers to unknown IP addresses. Implement intrusion detection system (IDS) rules to detect and alert on command injection signatures targeting the affected devices.

Compensating Controls: If immediate patching is not feasible, restrict access to the device's web management interface to a trusted internal network or specific IP addresses using firewall rules. If remote management is necessary, ensure it is done over a secure channel like a VPN. Disable Universal Plug and Play (UPnP) if not essential to business operations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) and the potential for complete system compromise from an unauthenticated attacker, this vulnerability presents a critical risk. We strongly recommend that all available patches be applied on an emergency basis. Although this vulnerability is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion. Organizations must act now to mitigate this risk before active exploitation begins.