CVE-2025-15162: Stack-based Buffer Overflow in Tenda WH450
A vulnerability was determined in Tenda WH450 1.0.0.18. Affected by this vulnerability is an unknown functionality of the file /goform/RouteStatic. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-15162 identifies a stack-based buffer overflow vulnerability in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unknown functionality related to the /goform/RouteStatic endpoint, specifically through manipulation of the 'page' argument. By sending a specially crafted request to this endpoint, an attacker can overflow a stack buffer, potentially overwriting the return address or other control data on the stack. This can lead to arbitrary code execution with elevated privileges on the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 base score of 8.6 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation. While no known exploits are currently active in the wild, the public disclosure of exploit code increases the risk of imminent attacks. The lack of available patches or official mitigation guidance from the vendor further exacerbates the threat. This vulnerability could be leveraged to take control of affected routers, disrupt network traffic, intercept sensitive data, or pivot to internal networks.
Potential Impact
The impact of CVE-2025-15162 is significant for organizations using Tenda WH450 routers. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code with high privileges. This can result in interception or manipulation of network traffic, disruption of network availability, and potential lateral movement within internal networks. Confidential information passing through the router may be exposed or altered, undermining data integrity and privacy. The vulnerability's remote and unauthenticated nature increases the attack surface, enabling attackers to target devices directly from the internet or local networks. Organizations relying on these routers for critical infrastructure or sensitive communications face elevated risks of espionage, data breaches, and operational disruption. The absence of patches means that mitigation relies heavily on network-level controls and device replacement, increasing operational costs and complexity.
Mitigation Recommendations
Given the absence of official patches for Tenda WH450 firmware version 1.0.0.18, organizations should implement the following specific mitigations: 1) Immediately isolate affected devices from untrusted networks, especially the internet, to reduce exposure. 2) Restrict access to the router management interface and the /goform/RouteStatic endpoint using firewall rules or access control lists, allowing only trusted IP addresses. 3) Monitor network traffic for unusual or malformed requests targeting the /goform/RouteStatic path to detect exploitation attempts. 4) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect buffer overflow attempts against this endpoint. 5) Where possible, replace affected Tenda WH450 devices with models from vendors providing timely security updates and support. 6) Regularly audit and update network segmentation to limit the impact of compromised devices. 7) Engage with the vendor for firmware updates or security advisories and apply patches promptly once available. 8) Educate network administrators about this vulnerability and the importance of monitoring and restricting router management interfaces.
Affected Countries
China, India, Russia, Brazil, United States, Indonesia, Vietnam, Thailand, Malaysia, Mexico
CVE-2025-15162: Stack-based Buffer Overflow in Tenda WH450
Description
A vulnerability was determined in Tenda WH450 1.0.0.18. Affected by this vulnerability is an unknown functionality of the file /goform/RouteStatic. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15162 identifies a stack-based buffer overflow vulnerability in the Tenda WH450 router firmware version 1.0.0.18. The vulnerability resides in an unknown functionality related to the /goform/RouteStatic endpoint, specifically through manipulation of the 'page' argument. By sending a specially crafted request to this endpoint, an attacker can overflow a stack buffer, potentially overwriting the return address or other control data on the stack. This can lead to arbitrary code execution with elevated privileges on the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 base score of 8.6 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation. While no known exploits are currently active in the wild, the public disclosure of exploit code increases the risk of imminent attacks. The lack of available patches or official mitigation guidance from the vendor further exacerbates the threat. This vulnerability could be leveraged to take control of affected routers, disrupt network traffic, intercept sensitive data, or pivot to internal networks.
Potential Impact
The impact of CVE-2025-15162 is significant for organizations using Tenda WH450 routers. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code with high privileges. This can result in interception or manipulation of network traffic, disruption of network availability, and potential lateral movement within internal networks. Confidential information passing through the router may be exposed or altered, undermining data integrity and privacy. The vulnerability's remote and unauthenticated nature increases the attack surface, enabling attackers to target devices directly from the internet or local networks. Organizations relying on these routers for critical infrastructure or sensitive communications face elevated risks of espionage, data breaches, and operational disruption. The absence of patches means that mitigation relies heavily on network-level controls and device replacement, increasing operational costs and complexity.
Mitigation Recommendations
Given the absence of official patches for Tenda WH450 firmware version 1.0.0.18, organizations should implement the following specific mitigations: 1) Immediately isolate affected devices from untrusted networks, especially the internet, to reduce exposure. 2) Restrict access to the router management interface and the /goform/RouteStatic endpoint using firewall rules or access control lists, allowing only trusted IP addresses. 3) Monitor network traffic for unusual or malformed requests targeting the /goform/RouteStatic path to detect exploitation attempts. 4) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect buffer overflow attempts against this endpoint. 5) Where possible, replace affected Tenda WH450 devices with models from vendors providing timely security updates and support. 6) Regularly audit and update network segmentation to limit the impact of compromised devices. 7) Engage with the vendor for firmware updates or security advisories and apply patches promptly once available. 8) Educate network administrators about this vulnerability and the importance of monitoring and restricting router management interfaces.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T20:05:19.913Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b1db813ff03e2bee3f
Added to database: 12/30/2025, 10:22:41 PM
Last enriched: 2/24/2026, 10:34:14 PM
Last updated: 3/25/2026, 3:05:07 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.