CVE-2025-14878: Stack-based Buffer Overflow in Tenda WH450
A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-14878 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in the HTTP Request Handler component, specifically within the /goform/wirelessRestart endpoint. An attacker can manipulate the GO argument in an HTTP request to this endpoint, causing a stack-based buffer overflow. This overflow can lead to arbitrary code execution on the device, potentially allowing full compromise of the router. The vulnerability is remotely exploitable without requiring authentication or user interaction, significantly increasing its risk profile. The CVSS 4.0 score of 9.3 reflects its critical severity, with high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, a public exploit has been released, increasing the likelihood of active exploitation attempts. The lack of available patches at the time of disclosure means affected users must rely on temporary mitigations until firmware updates are issued by Tenda. The vulnerability's exploitation could allow attackers to disrupt network operations, intercept or manipulate traffic, or use the compromised device as a foothold for further attacks within an organization’s network.
Potential Impact
For European organizations, the impact of CVE-2025-14878 is significant. Compromise of Tenda WH450 routers could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of wireless connectivity. This is particularly critical for enterprises, government agencies, and critical infrastructure operators relying on these devices for secure network access. The vulnerability's remote exploitability without authentication means attackers can target exposed routers directly from the internet or internal networks. Exploitation could facilitate lateral movement, data exfiltration, or deployment of ransomware and other malware. The disruption of wireless services could also impact business continuity and operational efficiency. Given the widespread use of Tenda devices in small to medium-sized enterprises and home office environments, the threat extends to remote workers and smaller organizations that may lack robust security controls. The public release of an exploit increases the urgency for European organizations to assess their exposure and implement mitigations promptly.
Mitigation Recommendations
1. Immediate action should focus on identifying all Tenda WH450 devices running firmware version 1.0.0.18 within the network through asset inventory and network scanning. 2. Monitor network traffic for suspicious HTTP requests targeting the /goform/wirelessRestart endpoint, especially those containing unusual or malformed GO arguments. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Restrict remote access to router management interfaces using firewall rules or VPNs to reduce exposure. 5. Apply any available firmware updates from Tenda as soon as they are released; if no patch is currently available, engage with Tenda support for guidance or consider temporary device replacement. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts against this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for potential exploitation scenarios. 8. Consider deploying web application firewalls (WAFs) or reverse proxies to filter malicious HTTP requests targeting vulnerable endpoints. 9. Regularly audit and update router configurations to disable unnecessary services and enforce strong authentication where possible.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-14878: Stack-based Buffer Overflow in Tenda WH450
Description
A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14878 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in the HTTP Request Handler component, specifically within the /goform/wirelessRestart endpoint. An attacker can manipulate the GO argument in an HTTP request to this endpoint, causing a stack-based buffer overflow. This overflow can lead to arbitrary code execution on the device, potentially allowing full compromise of the router. The vulnerability is remotely exploitable without requiring authentication or user interaction, significantly increasing its risk profile. The CVSS 4.0 score of 9.3 reflects its critical severity, with high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, a public exploit has been released, increasing the likelihood of active exploitation attempts. The lack of available patches at the time of disclosure means affected users must rely on temporary mitigations until firmware updates are issued by Tenda. The vulnerability's exploitation could allow attackers to disrupt network operations, intercept or manipulate traffic, or use the compromised device as a foothold for further attacks within an organization’s network.
Potential Impact
For European organizations, the impact of CVE-2025-14878 is significant. Compromise of Tenda WH450 routers could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of wireless connectivity. This is particularly critical for enterprises, government agencies, and critical infrastructure operators relying on these devices for secure network access. The vulnerability's remote exploitability without authentication means attackers can target exposed routers directly from the internet or internal networks. Exploitation could facilitate lateral movement, data exfiltration, or deployment of ransomware and other malware. The disruption of wireless services could also impact business continuity and operational efficiency. Given the widespread use of Tenda devices in small to medium-sized enterprises and home office environments, the threat extends to remote workers and smaller organizations that may lack robust security controls. The public release of an exploit increases the urgency for European organizations to assess their exposure and implement mitigations promptly.
Mitigation Recommendations
1. Immediate action should focus on identifying all Tenda WH450 devices running firmware version 1.0.0.18 within the network through asset inventory and network scanning. 2. Monitor network traffic for suspicious HTTP requests targeting the /goform/wirelessRestart endpoint, especially those containing unusual or malformed GO arguments. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Restrict remote access to router management interfaces using firewall rules or VPNs to reduce exposure. 5. Apply any available firmware updates from Tenda as soon as they are released; if no patch is currently available, engage with Tenda support for guidance or consider temporary device replacement. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts against this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for potential exploitation scenarios. 8. Consider deploying web application firewalls (WAFs) or reverse proxies to filter malicious HTTP requests targeting vulnerable endpoints. 9. Regularly audit and update router configurations to disable unnecessary services and enforce strong authentication where possible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-18T11:11:50.520Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69442b344eb3efac36990c91
Added to database: 12/18/2025, 4:26:28 PM
Last enriched: 12/18/2025, 4:41:23 PM
Last updated: 12/19/2025, 10:57:19 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14455: CWE-862 Missing Authorization in wpchill Image Photo Gallery Final Tiles Grid
MediumCVE-2025-12361: CWE-862 Missing Authorization in saadiqbal myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.
MediumCVE-2025-66524: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache NiFi
HighCVE-2023-44247: Execute unauthorized code or commands in Fortinet FortiOS
MediumCVE-2025-66522: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.