Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15045: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-15045cvecve-2025-15045
Published: Tue Dec 23 2025 (12/23/2025, 21:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A flaw has been found in Tenda WH450 1.0.0.18. The affected element is an unknown function of the file /goform/Natlimit of the component HTTP Request Handler. This manipulation of the argument page causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:16:25 UTC

Technical Analysis

CVE-2025-15045 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unspecified function within the HTTP request handler component, specifically triggered by manipulating the argument 'page' in requests to the /goform/Natlimit endpoint. This manipulation causes a stack overflow, which can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The overflow can lead to arbitrary code execution with elevated privileges on the device, potentially allowing attackers to take full control of the router. Such control can be leveraged to intercept network traffic, launch further attacks within the network, or disrupt network availability. The CVSS 4.0 base score of 9.3 reflects the vulnerability's critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). Although no exploits have been observed in the wild yet, the publication of exploit code increases the likelihood of active exploitation. The vulnerability affects a specific firmware version, indicating that upgrading to a patched version (when available) is essential. The lack of patch links suggests that the vendor may not have released a fix at the time of publication, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-15045 can be significant, especially for small and medium enterprises (SMEs) and home office users relying on Tenda WH450 routers. Successful exploitation can lead to full compromise of the affected device, enabling attackers to intercept sensitive communications, manipulate network traffic, and potentially pivot to internal systems. This threatens confidentiality, integrity, and availability of corporate networks and data. Given the router's role as a network gateway, attackers could establish persistent footholds, conduct man-in-the-middle attacks, or disrupt business operations through denial of service. The critical severity and remote exploitability without authentication increase the risk profile. European organizations with limited IT security resources may be particularly vulnerable if devices are not promptly updated or protected. Additionally, the exposure of these devices to the internet or untrusted networks exacerbates the risk. The potential for widespread exploitation could also impact critical infrastructure sectors that utilize such devices in their network perimeters.

Mitigation Recommendations

1. Immediate action should be to check for and apply any official firmware updates from Tenda addressing this vulnerability. Monitor vendor communications for patch releases. 2. If patches are unavailable, restrict access to the /goform/Natlimit endpoint by implementing firewall rules or access control lists (ACLs) to block incoming HTTP requests targeting this path from untrusted networks. 3. Segment and isolate affected devices within the network to limit potential lateral movement if compromised. 4. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 5. Regularly audit and monitor router logs for unusual activity or unauthorized access attempts. 6. Consider replacing vulnerable devices with models from vendors with stronger security track records if long-term support is uncertain. 7. Educate users and administrators about the risks of exposed management interfaces and enforce strong network perimeter security practices. 8. Disable remote management features on the router unless absolutely necessary and restrict management access to trusted internal IP addresses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-23T14:15:20.316Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b06504eddf7475afca1a7

Added to database: 12/23/2025, 9:14:56 PM

Last enriched: 12/23/2025, 9:16:25 PM

Last updated: 12/23/2025, 10:50:39 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats