POC详情: ae0f53b9884a1ee483c511c291f4617505b7d134

来源
关联漏洞
标题: Tenda FH451 安全漏洞 (CVE-2025-7795)
描述:Tenda FH451是中国腾达(Tenda)公司的一款路由器。 Tenda FH451 1.0.0.9版本存在安全漏洞,该漏洞源于对文件/goform/P2pListFilter中参数page的错误操作导致栈缓冲区溢出。
描述
Proof-of-Concept exploit for CVE-2025-7795 – A buffer overflow vulnerability affecting certain Tenda routers. The exploit sends crafted POST requests to trigger a crash and confirms the impact using ICMP (ping) checks.
介绍
# CVE-2025-7795 – Tenda Router Buffer Overflow Exploit

> **Author**: Byte Reaper  
> **Telegram**: [@ByteReaper0](https://t.me/ByteReaper0)  
> **CVE-ID**: CVE-2025-7795  
> **Vulnerability Type**: Buffer Overflow  
> **Target**: Tenda Routers  
> **Exploit**: Remote, Unauthenticated  

---

## 📝 Description

A **buffer overflow** vulnerability exists in certain Tenda router models. It can be triggered by sending a crafted unauthenticated `POST` request to the unprotected endpoint:

Save the exploit source code to exploit.c.

Compile the code:

gcc exploit.c argparse.c -o exploit -lcurl
##  Usage

sudo ./exploit -i <TARGET_IP> [-v]
# or
sudo ./exploit -u <TARGET_URL> [-v]
-i, --ip    : Target device IP address.

-u, --url   : Full URL to the target (e.g., http://192.168.0.1).

-v, --verbose: Enable verbose output (prints request payloads and details).

Examples
Exploit by IP:

sudo ./exploit -i 192.168.1.1
Exploit by URL with verbose mode:

sudo ./exploit -u http://router.local -v
🔍 How It Works
The exploit generates a POST payload of the form list=AAAA…, starting at 3500 bytes and increasing by 1000 bytes each iteration (5 iterations total).

It sends the request to /goform/fromP2pListFilter using libcurl.

On HTTP 2xx responses, it reports that the server is still responsive.

On non-2xx responses or connection failures, it issues a ping to the target IP to confirm whether the device has crashed.

⚠️ Disclaimer
Authorized testing only: Use this exploit solely in environments where you have explicit permission to test.

Legal notice: Unauthorized use against systems you do not own or have permission to test may be illegal.
文件快照

[4.0K] /data/pocs/ae0f53b9884a1ee483c511c291f4617505b7d134 ├── [ 12K] exploit.c ├── [1.0K] LICENSE └── [1.7K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。