Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14878: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-14878cvecve-2025-14878
Published: Thu Dec 18 2025 (12/18/2025, 16:02:12 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 12/18/2025, 16:41:23 UTC

Technical Analysis

CVE-2025-14878 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in the HTTP Request Handler component, specifically within the /goform/wirelessRestart endpoint. An attacker can manipulate the GO argument in an HTTP request to this endpoint, causing a stack-based buffer overflow. This overflow can lead to arbitrary code execution on the device, potentially allowing full compromise of the router. The vulnerability is remotely exploitable without requiring authentication or user interaction, significantly increasing its risk profile. The CVSS 4.0 score of 9.3 reflects its critical severity, with high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, a public exploit has been released, increasing the likelihood of active exploitation attempts. The lack of available patches at the time of disclosure means affected users must rely on temporary mitigations until firmware updates are issued by Tenda. The vulnerability's exploitation could allow attackers to disrupt network operations, intercept or manipulate traffic, or use the compromised device as a foothold for further attacks within an organization’s network.

Potential Impact

For European organizations, the impact of CVE-2025-14878 is significant. Compromise of Tenda WH450 routers could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of wireless connectivity. This is particularly critical for enterprises, government agencies, and critical infrastructure operators relying on these devices for secure network access. The vulnerability's remote exploitability without authentication means attackers can target exposed routers directly from the internet or internal networks. Exploitation could facilitate lateral movement, data exfiltration, or deployment of ransomware and other malware. The disruption of wireless services could also impact business continuity and operational efficiency. Given the widespread use of Tenda devices in small to medium-sized enterprises and home office environments, the threat extends to remote workers and smaller organizations that may lack robust security controls. The public release of an exploit increases the urgency for European organizations to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

1. Immediate action should focus on identifying all Tenda WH450 devices running firmware version 1.0.0.18 within the network through asset inventory and network scanning. 2. Monitor network traffic for suspicious HTTP requests targeting the /goform/wirelessRestart endpoint, especially those containing unusual or malformed GO arguments. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Restrict remote access to router management interfaces using firewall rules or VPNs to reduce exposure. 5. Apply any available firmware updates from Tenda as soon as they are released; if no patch is currently available, engage with Tenda support for guidance or consider temporary device replacement. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts against this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for potential exploitation scenarios. 8. Consider deploying web application firewalls (WAFs) or reverse proxies to filter malicious HTTP requests targeting vulnerable endpoints. 9. Regularly audit and update router configurations to disable unnecessary services and enforce strong authentication where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-18T11:11:50.520Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69442b344eb3efac36990c91

Added to database: 12/18/2025, 4:26:28 PM

Last enriched: 12/18/2025, 4:41:23 PM

Last updated: 12/19/2025, 10:57:19 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats