Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15010: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-15010cvecve-2025-15010
Published: Mon Dec 22 2025 (12/22/2025, 03:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A vulnerability has been found in Tenda WH450 1.0.0.18. This issue affects some unknown processing of the file /goform/SafeUrlFilter. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 12/22/2025, 03:25:37 UTC

Technical Analysis

CVE-2025-15010 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The flaw exists in the handling of the 'page' parameter within the /goform/SafeUrlFilter endpoint, where improper input validation allows an attacker to overflow the stack buffer. This overflow can overwrite control data on the stack, enabling remote code execution (RCE) without requiring any authentication or user interaction. The vulnerability is remotely exploitable over the network, making it highly dangerous for exposed devices. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, with attack vector being network-based, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits are currently active in the wild, the public disclosure of exploit details increases the likelihood of imminent attacks. The vulnerability could be leveraged by attackers to gain full control over affected routers, allowing interception or manipulation of network traffic, deployment of malware, or pivoting into internal networks. The lack of available patches at the time of disclosure necessitates immediate mitigation through network controls or vendor updates once available.

Potential Impact

For European organizations, exploitation of CVE-2025-15010 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive communications, and disruption of network services. Compromised routers could serve as entry points for broader attacks such as ransomware, espionage, or data exfiltration. Critical infrastructure sectors relying on Tenda WH450 devices, such as small to medium enterprises, educational institutions, or remote offices, may face operational disruptions and data breaches. The vulnerability’s remote and unauthenticated nature increases the risk of widespread exploitation, especially in environments where these routers are directly exposed to the internet or insufficiently segmented. The potential for attackers to execute arbitrary code on network gateways threatens the confidentiality, integrity, and availability of organizational data and services.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Tenda WH450 devices from untrusted networks and restricting access to the /goform/SafeUrlFilter endpoint via firewall rules or network segmentation. Organizations should monitor network traffic for suspicious requests targeting this endpoint. Since no official patches are currently available, applying vendor firmware updates as soon as they are released is critical. In the interim, consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability. Network administrators should audit their device inventories to identify affected versions and replace or upgrade vulnerable hardware if necessary. Additionally, disabling remote management interfaces or restricting them to trusted IP addresses can reduce exposure. Regular backups and incident response plans should be reviewed and updated to prepare for potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-21T16:27:33.876Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6948ba199b5fbca4f5110ea3

Added to database: 12/22/2025, 3:25:13 AM

Last enriched: 12/22/2025, 3:25:37 AM

Last updated: 12/22/2025, 6:25:43 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-15014: SQL Injection in loganhong php loganSite

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

High
VulnerabilityMon Dec 22 2025

CVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats