CVE-2025-15161: Stack-based Buffer Overflow in Tenda WH450
A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing a manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-15161 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability is located in an unspecified function within the /goform/PPTPUserSetting endpoint, where improper handling of the 'delno' parameter allows an attacker to overflow the stack buffer. This overflow can corrupt memory, potentially enabling remote code execution or causing a denial of service. The vulnerability is remotely exploitable over the network without requiring user interaction, but it requires the attacker to have high privileges (PR:H) on the device, indicating some form of prior authentication or elevated access is necessary. The CVSS 4.0 score of 8.6 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. Although no exploits have been observed in the wild, a public exploit exists, increasing the risk of exploitation. The vulnerability affects only the specific firmware version 1.0.0.18, and no official patches have been linked yet. The vulnerability could be leveraged by attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network services.
Potential Impact
The exploitation of CVE-2025-15161 can have severe consequences for organizations relying on Tenda WH450 routers. Successful exploitation may allow attackers to execute arbitrary code remotely, leading to full device compromise. This can result in unauthorized access to internal networks, interception of sensitive data, manipulation of network traffic, or disruption of network availability. Given the router's role as a network gateway, such compromise can facilitate lateral movement within corporate networks or enable persistent backdoors. The requirement for high privileges limits the attack surface to some extent but does not eliminate risk, especially in environments where credential compromise or insider threats are possible. The public availability of an exploit increases the likelihood of targeted attacks, particularly against organizations that delay patching. The impact extends to confidentiality, integrity, and availability, potentially affecting business continuity and data security.
Mitigation Recommendations
Organizations should immediately assess their network for the presence of Tenda WH450 devices running firmware version 1.0.0.18. Until an official patch is released, network administrators should restrict access to the /goform/PPTPUserSetting endpoint by implementing firewall rules or access control lists to limit exposure to trusted management networks only. Enforce strong authentication and credential management to prevent unauthorized access that could lead to exploitation. Monitor network traffic and device logs for unusual activity indicative of exploitation attempts. Consider segmenting vulnerable devices from critical infrastructure to reduce potential impact. Once a vendor patch is available, prioritize prompt deployment. Additionally, disable PPTP services if not required, as this may reduce the attack surface. Employ intrusion detection/prevention systems capable of identifying exploitation attempts targeting this vulnerability.
Affected Countries
China, India, Russia, Brazil, United States, Indonesia, Vietnam, Thailand, Malaysia, Philippines
CVE-2025-15161: Stack-based Buffer Overflow in Tenda WH450
Description
A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing a manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15161 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability is located in an unspecified function within the /goform/PPTPUserSetting endpoint, where improper handling of the 'delno' parameter allows an attacker to overflow the stack buffer. This overflow can corrupt memory, potentially enabling remote code execution or causing a denial of service. The vulnerability is remotely exploitable over the network without requiring user interaction, but it requires the attacker to have high privileges (PR:H) on the device, indicating some form of prior authentication or elevated access is necessary. The CVSS 4.0 score of 8.6 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. Although no exploits have been observed in the wild, a public exploit exists, increasing the risk of exploitation. The vulnerability affects only the specific firmware version 1.0.0.18, and no official patches have been linked yet. The vulnerability could be leveraged by attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network services.
Potential Impact
The exploitation of CVE-2025-15161 can have severe consequences for organizations relying on Tenda WH450 routers. Successful exploitation may allow attackers to execute arbitrary code remotely, leading to full device compromise. This can result in unauthorized access to internal networks, interception of sensitive data, manipulation of network traffic, or disruption of network availability. Given the router's role as a network gateway, such compromise can facilitate lateral movement within corporate networks or enable persistent backdoors. The requirement for high privileges limits the attack surface to some extent but does not eliminate risk, especially in environments where credential compromise or insider threats are possible. The public availability of an exploit increases the likelihood of targeted attacks, particularly against organizations that delay patching. The impact extends to confidentiality, integrity, and availability, potentially affecting business continuity and data security.
Mitigation Recommendations
Organizations should immediately assess their network for the presence of Tenda WH450 devices running firmware version 1.0.0.18. Until an official patch is released, network administrators should restrict access to the /goform/PPTPUserSetting endpoint by implementing firewall rules or access control lists to limit exposure to trusted management networks only. Enforce strong authentication and credential management to prevent unauthorized access that could lead to exploitation. Monitor network traffic and device logs for unusual activity indicative of exploitation attempts. Consider segmenting vulnerable devices from critical infrastructure to reduce potential impact. Once a vendor patch is available, prioritize prompt deployment. Additionally, disable PPTP services if not required, as this may reduce the attack surface. Employ intrusion detection/prevention systems capable of identifying exploitation attempts targeting this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T20:05:17.111Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b1db813ff03e2bee35
Added to database: 12/30/2025, 10:22:41 PM
Last enriched: 2/24/2026, 10:33:56 PM
Last updated: 3/25/2026, 12:30:15 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.