Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15007: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-15007cvecve-2025-15007
Published: Mon Dec 22 2025 (12/22/2025, 01:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A security vulnerability has been detected in Tenda WH450 1.0.0.18. Affected by this issue is some unknown functionality of the file /goform/L7Im of the component HTTP Request Handler. Such manipulation of the argument page leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:11:57 UTC

Technical Analysis

CVE-2025-15007 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in the HTTP request handler component, specifically within the /goform/L7Im endpoint. The flaw is triggered by manipulating the 'page' argument in the HTTP request, which leads to a stack overflow due to insufficient bounds checking or improper input validation. This overflow can corrupt the stack, potentially allowing an attacker to execute arbitrary code remotely without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as exploitation could lead to full system compromise, including remote code execution and denial of service. Although no exploits are currently reported in the wild, the public disclosure of the exploit code increases the likelihood of active exploitation attempts. The vulnerability affects only version 1.0.0.18 of the Tenda WH450, and no official patches have been linked yet. The Tenda WH450 is a consumer and small office/home office (SOHO) router, and its compromise could lead to network infiltration, data interception, or lateral movement within affected environments.

Potential Impact

The impact of CVE-2025-15007 is significant for organizations using the Tenda WH450 router version 1.0.0.18. Successful exploitation allows remote attackers to execute arbitrary code on the device, potentially gaining full control over the router. This can lead to interception or manipulation of network traffic, disruption of network availability, and compromise of connected devices. For enterprises and critical infrastructure relying on these routers, this could result in data breaches, espionage, or service outages. The vulnerability's remote exploitability without authentication or user interaction increases the risk of automated attacks and wormable propagation within vulnerable networks. The lack of current patches or mitigations further exacerbates the threat, making timely response critical. Additionally, attackers could use compromised routers as footholds for broader attacks against internal networks or as part of botnets for distributed denial-of-service (DDoS) campaigns.

Mitigation Recommendations

1. Immediate mitigation should focus on isolating affected Tenda WH450 devices from untrusted networks, especially the internet, to reduce exposure. 2. Network administrators should implement strict firewall rules to block external access to the /goform/L7Im endpoint or the router’s management interface from untrusted sources. 3. Monitor network traffic for unusual patterns or signs of exploitation attempts targeting the vulnerable endpoint. 4. If possible, downgrade or upgrade the firmware to a version not affected by this vulnerability once an official patch is released by Tenda. 5. Employ network segmentation to limit the impact of a compromised router on critical internal systems. 6. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts against this vulnerability. 7. Regularly audit and inventory network devices to identify and track vulnerable Tenda WH450 units. 8. Engage with Tenda support or trusted vendors to obtain security updates or guidance. 9. Consider replacing vulnerable devices with more secure alternatives if patches are unavailable or delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-21T12:46:54.286Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6948a94d0a1294c2fe493cd6

Added to database: 12/22/2025, 2:13:33 AM

Last enriched: 2/24/2026, 11:11:57 PM

Last updated: 3/24/2026, 9:14:53 PM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses