A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. This affects the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. The manipulation of the argument PPW leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md | Exploit Third Party Advisory |
| https://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md#payload | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.316737 | Permissions Required VDB Entry |
| https://vuldb.com/?id.316737 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.615487 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
| https://github.com/zezhifu1/cve_report/blob/main/FH451/fromWizardHandle.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-07-17 18:15
Updated : 2025-07-18 17:11
NVD link : CVE-2025-7747
Mitre link : CVE-2025-7747
CVE.ORG link : CVE-2025-7747
JSON object : View
Products Affected
tenda
- fh451
- fh451_firmware
