CVE-2025-7853

was · was Multiple Products

A high-severity vulnerability has been identified in software from the vendor 'was', impacting multiple products, including the Tenda FH451 router.

Executive summary

A high-severity vulnerability has been identified in software from the vendor 'was', impacting multiple products, including the Tenda FH451 router. This flaw could allow a remote, unauthenticated attacker to gain complete control over affected devices. Successful exploitation poses a significant risk of network compromise, data theft, and operational disruption, requiring immediate attention.

Vulnerability

The vulnerability is a critical flaw, likely an unauthenticated command injection or buffer overflow in the device's web management interface. An unauthenticated attacker on the same network (or remotely, if the management interface is exposed to the internet) can send a specially crafted HTTP request to a vulnerable endpoint. This request can inject and execute arbitrary operating system commands with the highest privileges on the device, effectively giving the attacker full administrative control.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could have a severe impact on the business by allowing an attacker to compromise a key network device. Potential consequences include, but are not limited to, eavesdropping on network traffic to steal sensitive information (loss of confidentiality), modifying system configurations to redirect traffic or disable security features (loss of integrity), and creating a persistent backdoor for future attacks. A compromised network device can serve as a pivot point for an attacker to move laterally across the internal network, escalating the incident from a single device compromise to a full-scale organizational breach.

Remediation

Immediate Action: Organizations must immediately identify all affected devices within their environment and apply the security updates provided by the vendor. The primary remediation is to patch the system firmware or software to the recommended secure version. After patching, system administrators should verify that the update was successfully applied and that the device is functioning as expected.

Proactive Monitoring: Continuously monitor network traffic to and from affected devices for any signs of compromise. Security teams should review device access logs and system logs for unusual activity, such as unexpected reboots, configuration changes, or outbound connections to unknown IP addresses. Implement network intrusion detection system (IDS) rules to look for signatures associated with command injection attempts (e.g., shell metacharacters like ;, |, && in URLs or API calls).

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce the risk of exploitation:

  • Restrict access to the device's management interface to a dedicated and secure administrative network.
  • Disable remote/WAN management on all affected devices.
  • If applicable, place a Web Application Firewall (WAF) in front of the device to filter malicious web requests.
  • Implement network segmentation to isolate the affected devices and limit the potential impact of a compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) of this vulnerability, we strongly recommend that organizations treat this as a critical priority. Although CVE-2025-7853 is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its characteristics make it a prime candidate for future inclusion and widespread exploitation. All organizations must immediately execute the Remediation Plan, focusing on patching systems without delay. If patching is not possible, implement compensating controls and heighten monitoring until a permanent fix can be applied.