Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16154 | A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function webExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
Fri, 20 Jun 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda fh451 Tenda fh451 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:fh451:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:fh451_firmware:1.0.0.9:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda fh451 Tenda fh451 Firmware |
Thu, 22 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function webExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda FH451 webExcptypemanFilter stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-05-22T18:06:30.148Z
Reserved: 2025-05-22T05:38:21.135Z
Link: CVE-2025-5080
Updated: 2025-05-22T17:42:51.224Z
Status : Analyzed
Published: 2025-05-22T15:16:06.670
Modified: 2025-06-20T16:03:35.810
Link: CVE-2025-5080
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:16Z
EUVD