CVE-2025-15010: Stack-based Buffer Overflow in Tenda WH450
A vulnerability has been found in Tenda WH450 1.0.0.18. This issue affects some unknown processing of the file /goform/SafeUrlFilter. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-15010 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The flaw exists in the handling of the 'page' parameter within the /goform/SafeUrlFilter endpoint, where improper input validation allows an attacker to overflow the stack buffer. This overflow can overwrite control data on the stack, enabling remote code execution (RCE) without requiring any authentication or user interaction. The vulnerability is remotely exploitable over the network, making it highly dangerous for exposed devices. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, with attack vector being network-based, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits are currently active in the wild, the public disclosure of exploit details increases the likelihood of imminent attacks. The vulnerability could be leveraged by attackers to gain full control over affected routers, allowing interception or manipulation of network traffic, deployment of malware, or pivoting into internal networks. The lack of available patches at the time of disclosure necessitates immediate mitigation through network controls or vendor updates once available.
Potential Impact
For European organizations, exploitation of CVE-2025-15010 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive communications, and disruption of network services. Compromised routers could serve as entry points for broader attacks such as ransomware, espionage, or data exfiltration. Critical infrastructure sectors relying on Tenda WH450 devices, such as small to medium enterprises, educational institutions, or remote offices, may face operational disruptions and data breaches. The vulnerability’s remote and unauthenticated nature increases the risk of widespread exploitation, especially in environments where these routers are directly exposed to the internet or insufficiently segmented. The potential for attackers to execute arbitrary code on network gateways threatens the confidentiality, integrity, and availability of organizational data and services.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Tenda WH450 devices from untrusted networks and restricting access to the /goform/SafeUrlFilter endpoint via firewall rules or network segmentation. Organizations should monitor network traffic for suspicious requests targeting this endpoint. Since no official patches are currently available, applying vendor firmware updates as soon as they are released is critical. In the interim, consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability. Network administrators should audit their device inventories to identify affected versions and replace or upgrade vulnerable hardware if necessary. Additionally, disabling remote management interfaces or restricting them to trusted IP addresses can reduce exposure. Regular backups and incident response plans should be reviewed and updated to prepare for potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-15010: Stack-based Buffer Overflow in Tenda WH450
Description
A vulnerability has been found in Tenda WH450 1.0.0.18. This issue affects some unknown processing of the file /goform/SafeUrlFilter. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-15010 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The flaw exists in the handling of the 'page' parameter within the /goform/SafeUrlFilter endpoint, where improper input validation allows an attacker to overflow the stack buffer. This overflow can overwrite control data on the stack, enabling remote code execution (RCE) without requiring any authentication or user interaction. The vulnerability is remotely exploitable over the network, making it highly dangerous for exposed devices. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, with attack vector being network-based, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits are currently active in the wild, the public disclosure of exploit details increases the likelihood of imminent attacks. The vulnerability could be leveraged by attackers to gain full control over affected routers, allowing interception or manipulation of network traffic, deployment of malware, or pivoting into internal networks. The lack of available patches at the time of disclosure necessitates immediate mitigation through network controls or vendor updates once available.
Potential Impact
For European organizations, exploitation of CVE-2025-15010 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive communications, and disruption of network services. Compromised routers could serve as entry points for broader attacks such as ransomware, espionage, or data exfiltration. Critical infrastructure sectors relying on Tenda WH450 devices, such as small to medium enterprises, educational institutions, or remote offices, may face operational disruptions and data breaches. The vulnerability’s remote and unauthenticated nature increases the risk of widespread exploitation, especially in environments where these routers are directly exposed to the internet or insufficiently segmented. The potential for attackers to execute arbitrary code on network gateways threatens the confidentiality, integrity, and availability of organizational data and services.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Tenda WH450 devices from untrusted networks and restricting access to the /goform/SafeUrlFilter endpoint via firewall rules or network segmentation. Organizations should monitor network traffic for suspicious requests targeting this endpoint. Since no official patches are currently available, applying vendor firmware updates as soon as they are released is critical. In the interim, consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability. Network administrators should audit their device inventories to identify affected versions and replace or upgrade vulnerable hardware if necessary. Additionally, disabling remote management interfaces or restricting them to trusted IP addresses can reduce exposure. Regular backups and incident response plans should be reviewed and updated to prepare for potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-21T16:27:33.876Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6948ba199b5fbca4f5110ea3
Added to database: 12/22/2025, 3:25:13 AM
Last enriched: 12/22/2025, 3:25:37 AM
Last updated: 12/22/2025, 6:25:43 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15014: SQL Injection in loganhong php loganSite
MediumCVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01
CriticalCVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalCVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
HighCVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.