CVE-2025-15046: Stack-based Buffer Overflow in Tenda WH450
A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is an unknown function of the file /goform/PPTPClient of the component HTTP Request Handler. Such manipulation of the argument netmsk leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-15046 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unknown function within the HTTP request handler component, specifically the /goform/PPTPClient endpoint. The flaw is triggered by manipulating the netmsk argument in the HTTP request, which leads to a stack overflow condition. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The attack vector is network-based and requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 vector indicates an attack complexity of low, no privileges required, no user interaction, and a high impact on confidentiality, integrity, and availability. Although no exploits are currently observed in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects the core network functionality of the router, which is often deployed in enterprise and small-to-medium business environments, making it a critical threat to network security and stability.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the potential for remote code execution on network routers, which can lead to full compromise of the device. This can result in interception or manipulation of network traffic, disruption of network services, and potential lateral movement within corporate networks. Critical infrastructure, government agencies, and enterprises relying on Tenda WH450 devices for VPN or PPTP client functionality are particularly vulnerable. The compromise of such routers could lead to data breaches, espionage, or sabotage. Given the critical severity and ease of exploitation, the threat could disrupt business operations and damage organizational reputation. The lack of authentication and user interaction requirements further exacerbates the risk, allowing attackers to target devices directly over the internet or internal networks.
Mitigation Recommendations
1. Immediately isolate Tenda WH450 devices running firmware version 1.0.0.18 from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual or malformed HTTP requests targeting the /goform/PPTPClient endpoint, using IDS/IPS signatures or custom rules. 3. Implement network segmentation to limit access to vulnerable devices only to trusted management networks. 4. Apply vendor firmware updates or patches as soon as they become available; if no patch exists, consider replacing affected devices with secure alternatives. 5. Disable PPTP client functionality if not required, reducing the attack surface. 6. Employ strict firewall rules to restrict inbound access to router management interfaces. 7. Conduct regular vulnerability scans and penetration tests focusing on network infrastructure devices. 8. Educate network administrators about this vulnerability and the importance of timely patching and monitoring.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-15046: Stack-based Buffer Overflow in Tenda WH450
Description
A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is an unknown function of the file /goform/PPTPClient of the component HTTP Request Handler. Such manipulation of the argument netmsk leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-15046 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unknown function within the HTTP request handler component, specifically the /goform/PPTPClient endpoint. The flaw is triggered by manipulating the netmsk argument in the HTTP request, which leads to a stack overflow condition. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The attack vector is network-based and requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 vector indicates an attack complexity of low, no privileges required, no user interaction, and a high impact on confidentiality, integrity, and availability. Although no exploits are currently observed in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects the core network functionality of the router, which is often deployed in enterprise and small-to-medium business environments, making it a critical threat to network security and stability.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the potential for remote code execution on network routers, which can lead to full compromise of the device. This can result in interception or manipulation of network traffic, disruption of network services, and potential lateral movement within corporate networks. Critical infrastructure, government agencies, and enterprises relying on Tenda WH450 devices for VPN or PPTP client functionality are particularly vulnerable. The compromise of such routers could lead to data breaches, espionage, or sabotage. Given the critical severity and ease of exploitation, the threat could disrupt business operations and damage organizational reputation. The lack of authentication and user interaction requirements further exacerbates the risk, allowing attackers to target devices directly over the internet or internal networks.
Mitigation Recommendations
1. Immediately isolate Tenda WH450 devices running firmware version 1.0.0.18 from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual or malformed HTTP requests targeting the /goform/PPTPClient endpoint, using IDS/IPS signatures or custom rules. 3. Implement network segmentation to limit access to vulnerable devices only to trusted management networks. 4. Apply vendor firmware updates or patches as soon as they become available; if no patch exists, consider replacing affected devices with secure alternatives. 5. Disable PPTP client functionality if not required, reducing the attack surface. 6. Employ strict firewall rules to restrict inbound access to router management interfaces. 7. Conduct regular vulnerability scans and penetration tests focusing on network infrastructure devices. 8. Educate network administrators about this vulnerability and the importance of timely patching and monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-23T14:15:23.091Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694b0d95d69af40f312d38a9
Added to database: 12/23/2025, 9:45:57 PM
Last enriched: 12/23/2025, 10:00:52 PM
Last updated: 12/24/2025, 1:55:21 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15050: Unrestricted Upload in code-projects Student File Management System
MediumCVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-15049: SQL Injection in code-projects Online Farm System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.