Cyber Posture

CVE-2025-14995

HighPublic PoC

Published: 21 December 2025

Published
21 December 2025
Modified
31 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 34.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been…

more

disclosed to the public and may be used.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching and remediation of the specific stack-based buffer overflow flaw in the Tenda FH1201 firmware to eliminate the vulnerability.

prevent

Mandates validation of the manipulated 'page' argument in /goform/SetIpBind to ensure it does not exceed buffer bounds, directly preventing the sprintf-induced overflow.

prevent

Deploys memory protections such as stack canaries and ASLR to thwart exploitation of the stack-based buffer overflow even if input validation fails.

Security SummaryAI

CVE-2025-14995 is a stack-based buffer overflow vulnerability affecting the Tenda FH1201 router on firmware version 1.2.0.14(408). The flaw occurs in the sprintf function within the /goform/SetIpBind file, triggered by manipulation of the "page" argument.

The vulnerability can be exploited remotely by an attacker with low privileges (PR:L) over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation leads to high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in its CVSS v3.1 base score of 8.8, potentially enabling arbitrary code execution. It is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).

Advisories and references, including VulDB entries and a GitHub repository, document the vulnerability and provide a public proof-of-concept with reproduction details for the /goform/SetIpBind endpoint. No vendor patches or specific mitigations are mentioned in the available information.

The exploit has been disclosed publicly, increasing the risk of real-world attacks against unpatched Tenda FH1201 devices.

Details

CWE(s)

Affected Products

tenda
fh1201 firmware
1.2.0.14\(408\)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack-based buffer overflow in the router's web interface (/goform/SetIpBind) via remote manipulation of the 'page' argument enables exploitation of a public-facing application.

References