CVE-2025-15046: Stack-based Buffer Overflow in Tenda WH450
A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is an unknown function of the file /goform/PPTPClient of the component HTTP Request Handler. Such manipulation of the argument netmsk leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-15046 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unknown function within the HTTP request handler component, specifically triggered by manipulation of the 'netmsk' argument in requests sent to the /goform/PPTPClient endpoint. This improper input validation leads to a stack-based buffer overflow condition, which can be exploited remotely without requiring authentication or user interaction. The overflow can allow an attacker to execute arbitrary code on the device, potentially gaining full control over the router. The vulnerability has been assigned a CVSS 4.0 score of 9.3, reflecting its critical nature due to the ease of exploitation (network attack vector, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. The exploit has been publicly disclosed, though no confirmed active exploitation in the wild has been reported yet. The lack of available patches at the time of disclosure increases the urgency for affected users to implement mitigations. The vulnerability affects a specific firmware version (1.0.0.18) of the Tenda WH450, a consumer and small office/home office (SOHO) router model. This type of vulnerability is particularly dangerous because routers are critical network infrastructure devices that, if compromised, can be used to intercept, manipulate, or disrupt network traffic, or serve as a foothold for further attacks within an organization’s network.
Potential Impact
The impact of CVE-2025-15046 is significant for organizations using Tenda WH450 routers running firmware version 1.0.0.18. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the affected device. This compromises the confidentiality of network traffic, the integrity of network configurations, and the availability of network services. Attackers could intercept sensitive data, redirect traffic, deploy malware, or use the router as a pivot point for lateral movement within the network. For enterprises and critical infrastructure relying on these devices, this could result in data breaches, operational disruption, and reputational damage. The fact that exploitation requires no authentication or user interaction increases the risk of widespread attacks, especially if exploit code becomes widely available. The vulnerability also poses risks to home users and small businesses, potentially exposing them to privacy violations and network compromise. Given the router’s role as a gateway device, the scope of impact extends beyond the device itself to all connected systems and users.
Mitigation Recommendations
1. Immediate firmware upgrade: Check with Tenda for an official patch or firmware update addressing CVE-2025-15046 and apply it as soon as it becomes available. 2. Network segmentation: Isolate affected Tenda WH450 devices from critical network segments to limit potential lateral movement if compromised. 3. Disable PPTP client functionality: If the /goform/PPTPClient endpoint is not required, disable the PPTP client feature or block access to this endpoint via firewall rules to reduce attack surface. 4. Restrict management access: Limit remote management interfaces to trusted IP addresses and disable WAN-side management to prevent external exploitation. 5. Monitor network traffic: Implement intrusion detection/prevention systems (IDS/IPS) to detect anomalous HTTP requests targeting /goform/PPTPClient or unusual traffic patterns indicative of exploitation attempts. 6. Device replacement: For environments where patching is not feasible or timely, consider replacing affected devices with models that have no known vulnerabilities. 7. Incident response readiness: Prepare to respond to potential compromises by backing up configurations, logging device activity, and having a recovery plan in place. 8. Vendor communication: Maintain communication with Tenda for updates and advisories related to this vulnerability.
Affected Countries
China, United States, India, Brazil, Russia, Germany, United Kingdom, France, Australia, South Africa, Japan, South Korea
CVE-2025-15046: Stack-based Buffer Overflow in Tenda WH450
Description
A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is an unknown function of the file /goform/PPTPClient of the component HTTP Request Handler. Such manipulation of the argument netmsk leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15046 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unknown function within the HTTP request handler component, specifically triggered by manipulation of the 'netmsk' argument in requests sent to the /goform/PPTPClient endpoint. This improper input validation leads to a stack-based buffer overflow condition, which can be exploited remotely without requiring authentication or user interaction. The overflow can allow an attacker to execute arbitrary code on the device, potentially gaining full control over the router. The vulnerability has been assigned a CVSS 4.0 score of 9.3, reflecting its critical nature due to the ease of exploitation (network attack vector, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. The exploit has been publicly disclosed, though no confirmed active exploitation in the wild has been reported yet. The lack of available patches at the time of disclosure increases the urgency for affected users to implement mitigations. The vulnerability affects a specific firmware version (1.0.0.18) of the Tenda WH450, a consumer and small office/home office (SOHO) router model. This type of vulnerability is particularly dangerous because routers are critical network infrastructure devices that, if compromised, can be used to intercept, manipulate, or disrupt network traffic, or serve as a foothold for further attacks within an organization’s network.
Potential Impact
The impact of CVE-2025-15046 is significant for organizations using Tenda WH450 routers running firmware version 1.0.0.18. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the affected device. This compromises the confidentiality of network traffic, the integrity of network configurations, and the availability of network services. Attackers could intercept sensitive data, redirect traffic, deploy malware, or use the router as a pivot point for lateral movement within the network. For enterprises and critical infrastructure relying on these devices, this could result in data breaches, operational disruption, and reputational damage. The fact that exploitation requires no authentication or user interaction increases the risk of widespread attacks, especially if exploit code becomes widely available. The vulnerability also poses risks to home users and small businesses, potentially exposing them to privacy violations and network compromise. Given the router’s role as a gateway device, the scope of impact extends beyond the device itself to all connected systems and users.
Mitigation Recommendations
1. Immediate firmware upgrade: Check with Tenda for an official patch or firmware update addressing CVE-2025-15046 and apply it as soon as it becomes available. 2. Network segmentation: Isolate affected Tenda WH450 devices from critical network segments to limit potential lateral movement if compromised. 3. Disable PPTP client functionality: If the /goform/PPTPClient endpoint is not required, disable the PPTP client feature or block access to this endpoint via firewall rules to reduce attack surface. 4. Restrict management access: Limit remote management interfaces to trusted IP addresses and disable WAN-side management to prevent external exploitation. 5. Monitor network traffic: Implement intrusion detection/prevention systems (IDS/IPS) to detect anomalous HTTP requests targeting /goform/PPTPClient or unusual traffic patterns indicative of exploitation attempts. 6. Device replacement: For environments where patching is not feasible or timely, consider replacing affected devices with models that have no known vulnerabilities. 7. Incident response readiness: Prepare to respond to potential compromises by backing up configurations, logging device activity, and having a recovery plan in place. 8. Vendor communication: Maintain communication with Tenda for updates and advisories related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-23T14:15:23.091Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694b0d95d69af40f312d38a9
Added to database: 12/23/2025, 9:45:57 PM
Last enriched: 2/24/2026, 10:28:02 PM
Last updated: 3/25/2026, 2:09:09 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.