CVE-2025-15161: Stack-based Buffer Overflow in Tenda WH450
A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-15161 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unspecified function processing HTTP requests to the /goform/PPTPUserSetting endpoint. Specifically, the 'delno' parameter can be manipulated by an attacker to overflow a stack buffer, leading to memory corruption. This flaw enables remote code execution (RCE) without requiring authentication or user interaction, as the vulnerable endpoint is accessible remotely over the network. The vulnerability has a CVSS 4.0 base score of 8.6, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:H but likely a typo or misconfiguration since the description states no authentication), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The exploit code has been publicly disclosed, increasing the likelihood of exploitation by threat actors. The vulnerability affects only firmware version 1.0.0.18, and no official patches have been linked yet. The absence of patches combined with public exploit availability makes this a critical risk for affected devices. Attackers exploiting this vulnerability could gain full control over the router, enabling interception or manipulation of network traffic, disruption of services, or pivoting into internal networks.
Potential Impact
For European organizations, exploitation of CVE-2025-15161 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive communications, and disruption of critical network services. Organizations relying on Tenda WH450 routers in their infrastructure, especially in small to medium enterprises or branch offices, could face data breaches or operational downtime. The ability to execute code remotely without authentication means attackers can compromise devices en masse if exposed to the internet. This could facilitate lateral movement within corporate networks, espionage, or ransomware deployment. Critical sectors such as finance, healthcare, and government agencies in Europe could be particularly impacted due to the sensitivity of data and reliance on secure network infrastructure. Additionally, compromised routers could be recruited into botnets, amplifying broader cyber threats. The lack of patches at the time of disclosure increases the window of exposure, necessitating immediate defensive measures.
Mitigation Recommendations
1. Immediately isolate Tenda WH450 devices running firmware version 1.0.0.18 from untrusted networks, especially the internet, to prevent remote exploitation. 2. Monitor network traffic for suspicious requests targeting the /goform/PPTPUserSetting endpoint, particularly those manipulating the 'delno' parameter. 3. Implement network-level filtering or firewall rules to block HTTP requests to the vulnerable endpoint from external sources. 4. Engage with Tenda support channels to obtain or request firmware updates or patches addressing this vulnerability. 5. If patching is not immediately available, consider replacing affected devices with alternative hardware from vendors with timely security support. 6. Conduct thorough network segmentation to limit the impact of compromised devices. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability or exploit attempts. 8. Educate IT staff about the vulnerability and ensure incident response plans include steps for this specific threat. 9. Regularly audit device firmware versions and configurations to maintain security hygiene.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-15161: Stack-based Buffer Overflow in Tenda WH450
Description
A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-15161 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unspecified function processing HTTP requests to the /goform/PPTPUserSetting endpoint. Specifically, the 'delno' parameter can be manipulated by an attacker to overflow a stack buffer, leading to memory corruption. This flaw enables remote code execution (RCE) without requiring authentication or user interaction, as the vulnerable endpoint is accessible remotely over the network. The vulnerability has a CVSS 4.0 base score of 8.6, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:H but likely a typo or misconfiguration since the description states no authentication), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The exploit code has been publicly disclosed, increasing the likelihood of exploitation by threat actors. The vulnerability affects only firmware version 1.0.0.18, and no official patches have been linked yet. The absence of patches combined with public exploit availability makes this a critical risk for affected devices. Attackers exploiting this vulnerability could gain full control over the router, enabling interception or manipulation of network traffic, disruption of services, or pivoting into internal networks.
Potential Impact
For European organizations, exploitation of CVE-2025-15161 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive communications, and disruption of critical network services. Organizations relying on Tenda WH450 routers in their infrastructure, especially in small to medium enterprises or branch offices, could face data breaches or operational downtime. The ability to execute code remotely without authentication means attackers can compromise devices en masse if exposed to the internet. This could facilitate lateral movement within corporate networks, espionage, or ransomware deployment. Critical sectors such as finance, healthcare, and government agencies in Europe could be particularly impacted due to the sensitivity of data and reliance on secure network infrastructure. Additionally, compromised routers could be recruited into botnets, amplifying broader cyber threats. The lack of patches at the time of disclosure increases the window of exposure, necessitating immediate defensive measures.
Mitigation Recommendations
1. Immediately isolate Tenda WH450 devices running firmware version 1.0.0.18 from untrusted networks, especially the internet, to prevent remote exploitation. 2. Monitor network traffic for suspicious requests targeting the /goform/PPTPUserSetting endpoint, particularly those manipulating the 'delno' parameter. 3. Implement network-level filtering or firewall rules to block HTTP requests to the vulnerable endpoint from external sources. 4. Engage with Tenda support channels to obtain or request firmware updates or patches addressing this vulnerability. 5. If patching is not immediately available, consider replacing affected devices with alternative hardware from vendors with timely security support. 6. Conduct thorough network segmentation to limit the impact of compromised devices. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability or exploit attempts. 8. Educate IT staff about the vulnerability and ensure incident response plans include steps for this specific threat. 9. Regularly audit device firmware versions and configurations to maintain security hygiene.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T20:05:17.111Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b1db813ff03e2bee35
Added to database: 12/30/2025, 10:22:41 PM
Last enriched: 12/30/2025, 11:10:36 PM
Last updated: 2/2/2026, 10:17:00 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22229: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2
HighCVE-2026-22227: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2
HighCVE-2026-22226: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2
HighCVE-2026-22225: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2
HighCVE-2026-22224: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.