Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14665: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-14665cvecve-2025-14665
Published: Sun Dec 14 2025 (12/14/2025, 15:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/DhcpListClient of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 12/21/2025, 17:23:55 UTC

Technical Analysis

CVE-2025-14665 is a critical security vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability is a stack-based buffer overflow located in the HTTP Request Handler component, specifically within the /goform/DhcpListClient endpoint. The flaw arises from improper handling of the 'page' argument, which when manipulated by an attacker, causes a buffer overflow on the stack. This type of vulnerability can lead to arbitrary code execution, allowing an attacker to take control of the affected device remotely. The attack vector is network-based, requiring no authentication or user interaction, which significantly increases the risk and ease of exploitation. The CVSS v4.0 score of 9.3 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. Although no confirmed exploits are currently observed in the wild, a public exploit has been released, increasing the likelihood of active exploitation attempts. The Tenda WH450 is a consumer and small business router, often deployed in home and office environments, making it a potential target for attackers seeking to compromise network infrastructure or pivot into internal networks. The lack of available patches at the time of disclosure necessitates immediate defensive actions to mitigate risk.

Potential Impact

The impact of CVE-2025-14665 on European organizations can be severe, particularly for small and medium enterprises and home office setups that utilize the Tenda WH450 router. Successful exploitation can lead to full device compromise, enabling attackers to intercept, modify, or disrupt network traffic, steal sensitive information, or use the device as a foothold for further attacks within the network. This can result in data breaches, loss of service, and potential lateral movement to critical systems. Given the router’s role as a network gateway, the vulnerability threatens the confidentiality, integrity, and availability of organizational data and services. Critical infrastructure sectors, including healthcare, finance, and government offices using these devices, face heightened risks. The remote and unauthenticated nature of the exploit means attackers can launch attacks from anywhere, increasing exposure. The public availability of an exploit further elevates the threat landscape, potentially leading to widespread attacks across Europe if mitigations are not promptly implemented.

Mitigation Recommendations

1. Immediately isolate Tenda WH450 devices running firmware version 1.0.0.18 from critical network segments to limit exposure. 2. Monitor network traffic for unusual HTTP requests targeting the /goform/DhcpListClient endpoint, especially those manipulating the 'page' parameter. 3. Apply network-level filtering or firewall rules to block or restrict access to the vulnerable endpoint from untrusted sources. 4. Engage with Tenda support channels to obtain and deploy firmware updates or patches as soon as they become available. 5. If patching is delayed, consider replacing vulnerable devices with alternative routers that have verified security postures. 6. Conduct internal network scans to detect any signs of compromise or lateral movement stemming from this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for this specific threat. 8. Employ network segmentation to contain potential breaches originating from compromised routers. 9. Regularly update and audit router configurations to minimize attack surface and disable unnecessary services. 10. Maintain up-to-date backups of router configurations and critical network devices to enable rapid recovery if needed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T13:34:13.890Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693ed5ec3c5c518da224526c

Added to database: 12/14/2025, 3:21:16 PM

Last enriched: 12/21/2025, 5:23:55 PM

Last updated: 2/6/2026, 9:10:26 PM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats