Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15046: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-15046cvecve-2025-15046
Published: Tue Dec 23 2025 (12/23/2025, 21:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is an unknown function of the file /goform/PPTPClient of the component HTTP Request Handler. Such manipulation of the argument netmsk leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 12/23/2025, 22:00:52 UTC

Technical Analysis

CVE-2025-15046 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unknown function within the HTTP request handler component, specifically the /goform/PPTPClient endpoint. The flaw is triggered by manipulating the netmsk argument in the HTTP request, which leads to a stack overflow condition. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The attack vector is network-based and requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 vector indicates an attack complexity of low, no privileges required, no user interaction, and a high impact on confidentiality, integrity, and availability. Although no exploits are currently observed in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects the core network functionality of the router, which is often deployed in enterprise and small-to-medium business environments, making it a critical threat to network security and stability.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for remote code execution on network routers, which can lead to full compromise of the device. This can result in interception or manipulation of network traffic, disruption of network services, and potential lateral movement within corporate networks. Critical infrastructure, government agencies, and enterprises relying on Tenda WH450 devices for VPN or PPTP client functionality are particularly vulnerable. The compromise of such routers could lead to data breaches, espionage, or sabotage. Given the critical severity and ease of exploitation, the threat could disrupt business operations and damage organizational reputation. The lack of authentication and user interaction requirements further exacerbates the risk, allowing attackers to target devices directly over the internet or internal networks.

Mitigation Recommendations

1. Immediately isolate Tenda WH450 devices running firmware version 1.0.0.18 from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual or malformed HTTP requests targeting the /goform/PPTPClient endpoint, using IDS/IPS signatures or custom rules. 3. Implement network segmentation to limit access to vulnerable devices only to trusted management networks. 4. Apply vendor firmware updates or patches as soon as they become available; if no patch exists, consider replacing affected devices with secure alternatives. 5. Disable PPTP client functionality if not required, reducing the attack surface. 6. Employ strict firewall rules to restrict inbound access to router management interfaces. 7. Conduct regular vulnerability scans and penetration tests focusing on network infrastructure devices. 8. Educate network administrators about this vulnerability and the importance of timely patching and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-23T14:15:23.091Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b0d95d69af40f312d38a9

Added to database: 12/23/2025, 9:45:57 PM

Last enriched: 12/23/2025, 10:00:52 PM

Last updated: 12/24/2025, 1:55:21 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats