Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15006: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-15006cvecve-2025-15006
Published: Mon Dec 22 2025 (12/22/2025, 01:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A weakness has been identified in Tenda WH450 1.0.0.18. Affected by this vulnerability is an unknown functionality of the file /goform/CheckTools of the component HTTP Request Handler. This manipulation of the argument ipaddress causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/22/2025, 01:40:26 UTC

Technical Analysis

CVE-2025-15006 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in the HTTP Request Handler component, specifically within the /goform/CheckTools endpoint. An attacker can remotely send a specially crafted HTTP request manipulating the 'ipaddress' parameter, causing a stack-based buffer overflow. This overflow can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device. The vulnerability requires no authentication or user interaction, making it highly accessible to remote attackers. The CVSS 4.0 base score is 9.3, indicating a critical severity with network attack vector, low complexity, no privileges required, and no user interaction needed. The impact covers confidentiality, integrity, and availability, as an attacker could intercept, modify, or disrupt network traffic or use the device as a pivot point for further attacks. Although no patches have been officially released yet, a public exploit is available, increasing the urgency for mitigation. The vulnerability affects only version 1.0.0.18 of the firmware, so upgrading to a fixed version when available is essential. Until then, network-level protections and access restrictions are recommended to reduce exposure.

Potential Impact

For European organizations, exploitation of CVE-2025-15006 could result in severe consequences including unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within corporate environments. Given the critical role routers play in network infrastructure, compromise of Tenda WH450 devices could undermine perimeter defenses and facilitate broader cyberattacks such as ransomware or espionage. Organizations in sectors like finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitivity of their data and the potential operational impact. The availability of a public exploit increases the likelihood of opportunistic attacks, including by cybercriminal groups targeting European entities. Additionally, the lack of authentication and user interaction requirements lowers the barrier for exploitation, making automated scanning and exploitation feasible. This could lead to widespread compromise if devices remain unpatched or unmitigated. The impact extends beyond individual organizations to national cybersecurity posture, especially where Tenda devices are deployed at scale.

Mitigation Recommendations

1. Immediately identify and inventory all Tenda WH450 devices running firmware version 1.0.0.18 within the network. 2. Restrict access to the management interface of these devices by implementing network segmentation and firewall rules that limit HTTP access to trusted administrative hosts only. 3. Disable remote management features if not strictly necessary to reduce exposure. 4. Monitor network traffic for unusual or suspicious HTTP requests targeting the /goform/CheckTools endpoint, using intrusion detection systems or custom signatures. 5. Apply virtual patching via web application firewalls (WAFs) or network intrusion prevention systems (IPS) to block exploit attempts targeting the vulnerable parameter. 6. Engage with Tenda support channels to obtain official patches or firmware updates and plan immediate deployment once available. 7. Educate network administrators about the vulnerability and ensure secure configuration practices are followed to minimize attack surface. 8. Consider replacing vulnerable devices with alternative hardware if patching is delayed or unavailable, especially in critical network segments. 9. Conduct regular vulnerability scanning and penetration testing to verify mitigation effectiveness and detect potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-21T12:46:46.289Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69489e000a1294c2fe3241ea

Added to database: 12/22/2025, 1:25:20 AM

Last enriched: 12/22/2025, 1:40:26 AM

Last updated: 2/3/2026, 1:42:54 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats