Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15178: Stack-based Buffer Overflow in Tenda WH450

0
High
VulnerabilityCVE-2025-15178cvecve-2025-15178
Published: Mon Dec 29 2025 (12/29/2025, 07:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: WH450

Description

A vulnerability was found in Tenda WH450 1.0.0.18. This issue affects some unknown processing of the file /goform/VirtualSer of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:35:51 UTC

Technical Analysis

CVE-2025-15178 is a stack-based buffer overflow vulnerability identified in the Tenda WH450 router firmware version 1.0.0.18. The flaw exists in the HTTP request handler component, specifically in the processing of the /goform/VirtualSer endpoint. The vulnerability is triggered by manipulating the 'page' argument, which is improperly validated or sanitized, leading to a stack buffer overflow condition. This overflow can corrupt the stack memory, allowing an attacker to overwrite the return address or other control data, potentially enabling arbitrary code execution on the device with elevated privileges. The attack vector is remote and does not require user interaction or authentication, making it highly accessible to threat actors. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its high severity due to network attack vector, low complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public availability of exploit code increases the likelihood of future attacks. The affected product, Tenda WH450, is a consumer and small business wireless router, commonly deployed in various regions worldwide. The absence of an official patch at the time of disclosure necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

The exploitation of CVE-2025-15178 can have severe consequences for organizations and individuals using the Tenda WH450 router. Successful exploitation allows remote attackers to execute arbitrary code with high privileges, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and the establishment of persistent backdoors. The confidentiality of sensitive data traversing the network can be breached, and the integrity of communications can be undermined. Availability may also be impacted if attackers cause device crashes or reboots. For organizations, this vulnerability could facilitate lateral movement within internal networks, data exfiltration, or launching further attacks against critical infrastructure. The risk is exacerbated by the router’s common use in small offices and home environments, where security monitoring and patch management are often limited. The public disclosure of exploit code increases the urgency to address this vulnerability before widespread exploitation occurs.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, organizations should implement immediate compensating controls to mitigate the risk. These include: 1) Restricting access to the router’s management interface by limiting exposure to trusted networks only, preferably via VPN or internal network segments. 2) Implementing network-level filtering to block or monitor HTTP requests targeting the /goform/VirtualSer endpoint, especially those containing suspicious 'page' parameter values. 3) Regularly auditing network traffic for anomalous patterns indicative of exploitation attempts. 4) Encouraging users to upgrade to newer firmware versions once patches are released by Tenda. 5) Segmenting networks to isolate vulnerable devices and reduce potential lateral movement. 6) Employing intrusion detection and prevention systems (IDS/IPS) configured to detect buffer overflow exploit signatures targeting Tenda devices. 7) Educating users about the risks of exposing router management interfaces to the internet and enforcing strong administrative credentials. These measures, combined with vigilant monitoring, can reduce the likelihood and impact of exploitation until a vendor patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T08:29:42.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b8db813ff03e2bf3be

Added to database: 12/30/2025, 10:22:48 PM

Last enriched: 2/24/2026, 10:35:51 PM

Last updated: 3/25/2026, 2:54:52 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses