CVE-2025-14665: Stack-based Buffer Overflow in Tenda WH450
A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/DhcpListClient of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-14665 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in the HTTP request handler component, specifically within the /goform/DhcpListClient endpoint. An attacker can manipulate the 'page' parameter in HTTP requests to overflow the stack buffer, potentially overwriting the return address or other control data on the stack. This can lead to arbitrary code execution on the device with the privileges of the HTTP handler process. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score of 9.3 reflects its critical severity, with attack vector being network-based, low attack complexity, and no privileges or user interaction needed. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could execute arbitrary commands, disrupt device operation, or pivot into internal networks. Although no confirmed exploits in the wild have been reported, public exploit code has been released, increasing the likelihood of active exploitation. The Tenda WH450 is typically used in small office and home office environments, which may lack robust security monitoring, increasing exposure. No official patches or mitigation guidance have been published yet, requiring organizations to implement interim protective measures. The vulnerability highlights the risks of embedded device firmware flaws and the importance of timely patching and network segmentation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly for small and medium enterprises (SMEs) and home office users relying on Tenda WH450 routers. Successful exploitation could allow attackers to gain full control over the affected device, enabling interception or manipulation of network traffic, deployment of malware, or lateral movement into corporate networks. This threatens the confidentiality of sensitive data, the integrity of network communications, and the availability of network services. Critical infrastructure sectors using these devices for network connectivity could face operational disruptions or espionage risks. The lack of authentication and user interaction requirements means attackers can exploit this remotely and stealthily. Given the public availability of exploit code, the window for exploitation is wide open until patches are deployed. The impact is amplified in environments where these routers are directly exposed to the internet or insufficiently segmented from critical assets. European organizations must consider this vulnerability a high priority to avoid potential data breaches, service outages, or compromise of internal systems.
Mitigation Recommendations
1. Immediately isolate Tenda WH450 devices from direct internet exposure by disabling remote management interfaces and restricting access to trusted internal networks only. 2. Implement strict network segmentation to separate these routers from critical infrastructure and sensitive data environments. 3. Monitor network traffic for unusual HTTP requests targeting the /goform/DhcpListClient endpoint, especially those manipulating the 'page' parameter. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. 5. Engage with Tenda support channels to obtain official patches or firmware updates addressing this vulnerability as soon as they become available. 6. Where possible, replace affected devices with alternative models that have verified security updates. 7. Educate IT staff and users about the risks and signs of exploitation to enable rapid incident response. 8. Conduct regular vulnerability assessments and penetration testing focusing on network edge devices. 9. Apply strict firewall rules to limit inbound traffic to management interfaces. 10. Maintain up-to-date asset inventories to quickly identify and remediate affected devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-14665: Stack-based Buffer Overflow in Tenda WH450
Description
A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/DhcpListClient of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14665 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in the HTTP request handler component, specifically within the /goform/DhcpListClient endpoint. An attacker can manipulate the 'page' parameter in HTTP requests to overflow the stack buffer, potentially overwriting the return address or other control data on the stack. This can lead to arbitrary code execution on the device with the privileges of the HTTP handler process. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score of 9.3 reflects its critical severity, with attack vector being network-based, low attack complexity, and no privileges or user interaction needed. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could execute arbitrary commands, disrupt device operation, or pivot into internal networks. Although no confirmed exploits in the wild have been reported, public exploit code has been released, increasing the likelihood of active exploitation. The Tenda WH450 is typically used in small office and home office environments, which may lack robust security monitoring, increasing exposure. No official patches or mitigation guidance have been published yet, requiring organizations to implement interim protective measures. The vulnerability highlights the risks of embedded device firmware flaws and the importance of timely patching and network segmentation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly for small and medium enterprises (SMEs) and home office users relying on Tenda WH450 routers. Successful exploitation could allow attackers to gain full control over the affected device, enabling interception or manipulation of network traffic, deployment of malware, or lateral movement into corporate networks. This threatens the confidentiality of sensitive data, the integrity of network communications, and the availability of network services. Critical infrastructure sectors using these devices for network connectivity could face operational disruptions or espionage risks. The lack of authentication and user interaction requirements means attackers can exploit this remotely and stealthily. Given the public availability of exploit code, the window for exploitation is wide open until patches are deployed. The impact is amplified in environments where these routers are directly exposed to the internet or insufficiently segmented from critical assets. European organizations must consider this vulnerability a high priority to avoid potential data breaches, service outages, or compromise of internal systems.
Mitigation Recommendations
1. Immediately isolate Tenda WH450 devices from direct internet exposure by disabling remote management interfaces and restricting access to trusted internal networks only. 2. Implement strict network segmentation to separate these routers from critical infrastructure and sensitive data environments. 3. Monitor network traffic for unusual HTTP requests targeting the /goform/DhcpListClient endpoint, especially those manipulating the 'page' parameter. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. 5. Engage with Tenda support channels to obtain official patches or firmware updates addressing this vulnerability as soon as they become available. 6. Where possible, replace affected devices with alternative models that have verified security updates. 7. Educate IT staff and users about the risks and signs of exploitation to enable rapid incident response. 8. Conduct regular vulnerability assessments and penetration testing focusing on network edge devices. 9. Apply strict firewall rules to limit inbound traffic to management interfaces. 10. Maintain up-to-date asset inventories to quickly identify and remediate affected devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T13:34:13.890Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693ed5ec3c5c518da224526c
Added to database: 12/14/2025, 3:21:16 PM
Last enriched: 12/14/2025, 3:36:18 PM
Last updated: 12/15/2025, 4:16:02 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14703: Improper Authentication in Shiguangwu sgwbox N3
MediumCVE-2025-14698: Path Traversal in atlaszz AI Photo Team Galleryit App
MediumCVE-2025-14697: Files or Directories Accessible in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumCVE-2025-67907
UnknownCVE-2025-14702: Path Traversal in Smartbit CommV Smartschool App
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.