Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15046: Stack-based Buffer Overflow in Tenda WH450

0
Critical
VulnerabilityCVE-2025-15046cvecve-2025-15046
Published: Tue Dec 23 2025 (12/23/2025, 21:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is an unknown function of the file /goform/PPTPClient of the component HTTP Request Handler. Such manipulation of the argument netmsk leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:28:02 UTC

Technical Analysis

CVE-2025-15046 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unknown function within the HTTP request handler component, specifically triggered by manipulation of the 'netmsk' argument in requests sent to the /goform/PPTPClient endpoint. This improper input validation leads to a stack-based buffer overflow condition, which can be exploited remotely without requiring authentication or user interaction. The overflow can allow an attacker to execute arbitrary code on the device, potentially gaining full control over the router. The vulnerability has been assigned a CVSS 4.0 score of 9.3, reflecting its critical nature due to the ease of exploitation (network attack vector, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. The exploit has been publicly disclosed, though no confirmed active exploitation in the wild has been reported yet. The lack of available patches at the time of disclosure increases the urgency for affected users to implement mitigations. The vulnerability affects a specific firmware version (1.0.0.18) of the Tenda WH450, a consumer and small office/home office (SOHO) router model. This type of vulnerability is particularly dangerous because routers are critical network infrastructure devices that, if compromised, can be used to intercept, manipulate, or disrupt network traffic, or serve as a foothold for further attacks within an organization’s network.

Potential Impact

The impact of CVE-2025-15046 is significant for organizations using Tenda WH450 routers running firmware version 1.0.0.18. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the affected device. This compromises the confidentiality of network traffic, the integrity of network configurations, and the availability of network services. Attackers could intercept sensitive data, redirect traffic, deploy malware, or use the router as a pivot point for lateral movement within the network. For enterprises and critical infrastructure relying on these devices, this could result in data breaches, operational disruption, and reputational damage. The fact that exploitation requires no authentication or user interaction increases the risk of widespread attacks, especially if exploit code becomes widely available. The vulnerability also poses risks to home users and small businesses, potentially exposing them to privacy violations and network compromise. Given the router’s role as a gateway device, the scope of impact extends beyond the device itself to all connected systems and users.

Mitigation Recommendations

1. Immediate firmware upgrade: Check with Tenda for an official patch or firmware update addressing CVE-2025-15046 and apply it as soon as it becomes available. 2. Network segmentation: Isolate affected Tenda WH450 devices from critical network segments to limit potential lateral movement if compromised. 3. Disable PPTP client functionality: If the /goform/PPTPClient endpoint is not required, disable the PPTP client feature or block access to this endpoint via firewall rules to reduce attack surface. 4. Restrict management access: Limit remote management interfaces to trusted IP addresses and disable WAN-side management to prevent external exploitation. 5. Monitor network traffic: Implement intrusion detection/prevention systems (IDS/IPS) to detect anomalous HTTP requests targeting /goform/PPTPClient or unusual traffic patterns indicative of exploitation attempts. 6. Device replacement: For environments where patching is not feasible or timely, consider replacing affected devices with models that have no known vulnerabilities. 7. Incident response readiness: Prepare to respond to potential compromises by backing up configurations, logging device activity, and having a recovery plan in place. 8. Vendor communication: Maintain communication with Tenda for updates and advisories related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-23T14:15:23.091Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b0d95d69af40f312d38a9

Added to database: 12/23/2025, 9:45:57 PM

Last enriched: 2/24/2026, 10:28:02 PM

Last updated: 3/25/2026, 2:09:09 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses