CVE-2025-14665: Stack-based Buffer Overflow in Tenda WH450
A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/DhcpListClient of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-14665 is a critical security vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability is a stack-based buffer overflow located in the HTTP Request Handler component, specifically within the /goform/DhcpListClient endpoint. The flaw arises from improper handling of the 'page' argument, which when manipulated by an attacker, causes a buffer overflow on the stack. This type of vulnerability can lead to arbitrary code execution, allowing an attacker to take control of the affected device remotely. The attack vector is network-based, requiring no authentication or user interaction, which significantly increases the risk and ease of exploitation. The CVSS v4.0 score of 9.3 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. Although no confirmed exploits are currently observed in the wild, a public exploit has been released, increasing the likelihood of active exploitation attempts. The Tenda WH450 is a consumer and small business router, often deployed in home and office environments, making it a potential target for attackers seeking to compromise network infrastructure or pivot into internal networks. The lack of available patches at the time of disclosure necessitates immediate defensive actions to mitigate risk.
Potential Impact
The impact of CVE-2025-14665 on European organizations can be severe, particularly for small and medium enterprises and home office setups that utilize the Tenda WH450 router. Successful exploitation can lead to full device compromise, enabling attackers to intercept, modify, or disrupt network traffic, steal sensitive information, or use the device as a foothold for further attacks within the network. This can result in data breaches, loss of service, and potential lateral movement to critical systems. Given the router’s role as a network gateway, the vulnerability threatens the confidentiality, integrity, and availability of organizational data and services. Critical infrastructure sectors, including healthcare, finance, and government offices using these devices, face heightened risks. The remote and unauthenticated nature of the exploit means attackers can launch attacks from anywhere, increasing exposure. The public availability of an exploit further elevates the threat landscape, potentially leading to widespread attacks across Europe if mitigations are not promptly implemented.
Mitigation Recommendations
1. Immediately isolate Tenda WH450 devices running firmware version 1.0.0.18 from critical network segments to limit exposure. 2. Monitor network traffic for unusual HTTP requests targeting the /goform/DhcpListClient endpoint, especially those manipulating the 'page' parameter. 3. Apply network-level filtering or firewall rules to block or restrict access to the vulnerable endpoint from untrusted sources. 4. Engage with Tenda support channels to obtain and deploy firmware updates or patches as soon as they become available. 5. If patching is delayed, consider replacing vulnerable devices with alternative routers that have verified security postures. 6. Conduct internal network scans to detect any signs of compromise or lateral movement stemming from this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for this specific threat. 8. Employ network segmentation to contain potential breaches originating from compromised routers. 9. Regularly update and audit router configurations to minimize attack surface and disable unnecessary services. 10. Maintain up-to-date backups of router configurations and critical network devices to enable rapid recovery if needed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-14665: Stack-based Buffer Overflow in Tenda WH450
Description
A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/DhcpListClient of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14665 is a critical security vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability is a stack-based buffer overflow located in the HTTP Request Handler component, specifically within the /goform/DhcpListClient endpoint. The flaw arises from improper handling of the 'page' argument, which when manipulated by an attacker, causes a buffer overflow on the stack. This type of vulnerability can lead to arbitrary code execution, allowing an attacker to take control of the affected device remotely. The attack vector is network-based, requiring no authentication or user interaction, which significantly increases the risk and ease of exploitation. The CVSS v4.0 score of 9.3 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. Although no confirmed exploits are currently observed in the wild, a public exploit has been released, increasing the likelihood of active exploitation attempts. The Tenda WH450 is a consumer and small business router, often deployed in home and office environments, making it a potential target for attackers seeking to compromise network infrastructure or pivot into internal networks. The lack of available patches at the time of disclosure necessitates immediate defensive actions to mitigate risk.
Potential Impact
The impact of CVE-2025-14665 on European organizations can be severe, particularly for small and medium enterprises and home office setups that utilize the Tenda WH450 router. Successful exploitation can lead to full device compromise, enabling attackers to intercept, modify, or disrupt network traffic, steal sensitive information, or use the device as a foothold for further attacks within the network. This can result in data breaches, loss of service, and potential lateral movement to critical systems. Given the router’s role as a network gateway, the vulnerability threatens the confidentiality, integrity, and availability of organizational data and services. Critical infrastructure sectors, including healthcare, finance, and government offices using these devices, face heightened risks. The remote and unauthenticated nature of the exploit means attackers can launch attacks from anywhere, increasing exposure. The public availability of an exploit further elevates the threat landscape, potentially leading to widespread attacks across Europe if mitigations are not promptly implemented.
Mitigation Recommendations
1. Immediately isolate Tenda WH450 devices running firmware version 1.0.0.18 from critical network segments to limit exposure. 2. Monitor network traffic for unusual HTTP requests targeting the /goform/DhcpListClient endpoint, especially those manipulating the 'page' parameter. 3. Apply network-level filtering or firewall rules to block or restrict access to the vulnerable endpoint from untrusted sources. 4. Engage with Tenda support channels to obtain and deploy firmware updates or patches as soon as they become available. 5. If patching is delayed, consider replacing vulnerable devices with alternative routers that have verified security postures. 6. Conduct internal network scans to detect any signs of compromise or lateral movement stemming from this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for this specific threat. 8. Employ network segmentation to contain potential breaches originating from compromised routers. 9. Regularly update and audit router configurations to minimize attack surface and disable unnecessary services. 10. Maintain up-to-date backups of router configurations and critical network devices to enable rapid recovery if needed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T13:34:13.890Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693ed5ec3c5c518da224526c
Added to database: 12/14/2025, 3:21:16 PM
Last enriched: 12/21/2025, 5:23:55 PM
Last updated: 2/6/2026, 9:10:26 PM
Views: 121
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25631: CWE-20: Improper Input Validation in n8n-io n8n
MediumCVE-2026-25592: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in microsoft semantic-kernel
CriticalCVE-2026-2066: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2026-25634: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.