关联漏洞
描述
Proof-of-Concept exploit for CVE-2025-7795 – A buffer overflow vulnerability affecting certain Tenda routers. The exploit sends crafted POST requests to trigger a crash and confirms the impact using ICMP (ping) checks.
介绍
# CVE-2025-7795 – Tenda Router Buffer Overflow Exploit
> **Author**: Byte Reaper
> **Telegram**: [@ByteReaper0](https://t.me/ByteReaper0)
> **CVE-ID**: CVE-2025-7795
> **Vulnerability Type**: Buffer Overflow
> **Target**: Tenda Routers
> **Exploit**: Remote, Unauthenticated
---
## 📝 Description
A **buffer overflow** vulnerability exists in certain Tenda router models. It can be triggered by sending a crafted unauthenticated `POST` request to the unprotected endpoint:
Save the exploit source code to exploit.c.
Compile the code:
gcc exploit.c argparse.c -o exploit -lcurl
## Usage
sudo ./exploit -i <TARGET_IP> [-v]
# or
sudo ./exploit -u <TARGET_URL> [-v]
-i, --ip : Target device IP address.
-u, --url : Full URL to the target (e.g., http://192.168.0.1).
-v, --verbose: Enable verbose output (prints request payloads and details).
Examples
Exploit by IP:
sudo ./exploit -i 192.168.1.1
Exploit by URL with verbose mode:
sudo ./exploit -u http://router.local -v
🔍 How It Works
The exploit generates a POST payload of the form list=AAAA…, starting at 3500 bytes and increasing by 1000 bytes each iteration (5 iterations total).
It sends the request to /goform/fromP2pListFilter using libcurl.
On HTTP 2xx responses, it reports that the server is still responsive.
On non-2xx responses or connection failures, it issues a ping to the target IP to confirm whether the device has crashed.
⚠️ Disclaimer
Authorized testing only: Use this exploit solely in environments where you have explicit permission to test.
Legal notice: Unauthorized use against systems you do not own or have permission to test may be illegal.
文件快照
[4.0K] /data/pocs/ae0f53b9884a1ee483c511c291f4617505b7d134
├── [ 12K] exploit.c
├── [1.0K] LICENSE
└── [1.7K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。