Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15007: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-15007cvecve-2025-15007
Published: Mon Dec 22 2025 (12/22/2025, 01:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A security vulnerability has been detected in Tenda WH450 1.0.0.18. Affected by this issue is some unknown functionality of the file /goform/L7Im of the component HTTP Request Handler. Such manipulation of the argument page leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 12/22/2025, 02:25:25 UTC

Technical Analysis

CVE-2025-15007 identifies a critical stack-based buffer overflow vulnerability in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in the HTTP Request Handler component, specifically in the /goform/L7Im endpoint. The issue arises from improper validation and handling of the 'page' argument, which allows an attacker to craft a malicious HTTP request that overflows the stack buffer. This overflow can corrupt the execution stack, enabling arbitrary code execution or denial of service conditions. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impacts on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the risk of imminent attacks. The Tenda WH450 is a consumer and small office/home office (SOHO) router, often deployed in various environments, including European small businesses and residential networks. The vulnerability's exploitation could allow attackers to gain control over the device, intercept or manipulate network traffic, and pivot into internal networks.

Potential Impact

For European organizations, the exploitation of CVE-2025-15007 could lead to severe consequences. Compromise of Tenda WH450 routers would allow attackers to execute arbitrary code, potentially gaining full control over the device. This can result in interception of sensitive data, disruption of network services, and lateral movement within corporate networks. Small and medium enterprises (SMEs) and home offices using these routers are particularly vulnerable due to typically weaker network segmentation and security controls. Critical sectors such as finance, healthcare, and government entities relying on these devices for connectivity could face data breaches, operational disruptions, and regulatory compliance issues under GDPR. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if exploit code is weaponized and integrated into automated scanning and exploitation tools. Additionally, the lack of patches at the time of disclosure may prolong exposure, increasing the window of opportunity for attackers.

Mitigation Recommendations

1. Immediate network-level mitigation: Restrict access to the router's management interface and the /goform/L7Im endpoint by implementing firewall rules that limit inbound HTTP requests to trusted IP addresses only. 2. Network segmentation: Isolate Tenda WH450 devices from critical internal networks to minimize potential lateral movement in case of compromise. 3. Monitor network traffic for anomalous HTTP requests targeting /goform/L7Im and unusual device behavior indicative of exploitation attempts. 4. Vendor engagement: Contact Tenda for official patches or firmware updates addressing CVE-2025-15007 and apply them promptly once available. 5. Device replacement: For high-risk environments, consider replacing affected Tenda WH450 routers with devices from vendors with a stronger security track record and timely patch management. 6. Incident response readiness: Prepare to detect and respond to potential exploitation attempts by updating intrusion detection/prevention systems (IDS/IPS) signatures and ensuring logging is enabled on network devices. 7. User awareness: Educate users about the risks of exposing router management interfaces to the internet and encourage secure configuration practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-21T12:46:54.286Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6948a94d0a1294c2fe493cd6

Added to database: 12/22/2025, 2:13:33 AM

Last enriched: 12/22/2025, 2:25:25 AM

Last updated: 12/22/2025, 5:00:17 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats