A vulnerability was detected in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/NatStaticSetting. The manipulation of the ar...
Description
A vulnerability was detected in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/NatStaticSetting. The manipulation of the argument page results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.
AI Analyst Comment
Remediation
Update A vulnerability was detected in Tenda Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical remote code execution vulnerability, identified as CVE-2025-15044, affects multiple Tenda products. This flaw allows a remote, unauthenticated attacker to gain complete control of a vulnerable device by sending a specially crafted request, posing a significant risk of network compromise, data theft, and further internal attacks. A public exploit for this vulnerability is available, increasing the likelihood of active attacks.
Vulnerability Details
CVE-ID: CVE-2025-15044
Affected Software: Tenda Multiple Products
Affected Versions: Tenda WH450 version 1.0.0.18 is confirmed to be affected. See vendor advisory for a complete list of all impacted products and versions.
Vulnerability: This vulnerability is a stack-based buffer overflow in the web management interface of affected Tenda devices. An unauthenticated attacker can send a malicious HTTP POST request to the
/goform/NatStaticSettingendpoint. By supplying an overly long string in thepageargument of this request, the attacker can overwrite the program's execution stack, leading to arbitrary code execution with the privileges of the web server process, which is typically root on these embedded devices.Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation allows an attacker to gain complete administrative control over the affected network device. The potential consequences include interception of all network traffic, modification of network configuration to redirect users to malicious sites, launching attacks against other devices on the internal network, and incorporating the compromised device into a botnet for use in larger attacks like Distributed Denial of Service (DDoS). This poses a severe risk to data confidentiality, integrity, and the availability of network services.
Remediation Plan
Immediate Action: Immediately update affected Tenda products to the latest firmware version as recommended by the vendor. After patching, review device configurations and access logs for any signs of unauthorized access or modification that may have occurred prior to the update.
Proactive Monitoring: Monitor web server access logs for anomalous requests to the
/goform/NatStaticSettingfile, specifically looking for POST requests with unusually long values for thepageparameter. Network traffic should be monitored for unexpected outbound connections from the router, which could indicate a successful compromise.Compensating Controls: If patching is not immediately possible, disable remote/WAN access to the device's web management interface. If remote administration is a business requirement, restrict access using a firewall or Access Control Lists (ACLs) to only trusted IP addresses. Deploying an Intrusion Prevention System (IPS) with up-to-date signatures may also help detect and block exploitation attempts.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of the publication date, Dec 23, 2025, a functional public exploit is available. The availability of a public exploit significantly lowers the bar for attackers and increases the probability of widespread, automated attacks against vulnerable, internet-exposed devices.
Analyst Recommendation
Given the critical CVSS score of 9.8, the remote and unauthenticated nature of the exploit, and the confirmed availability of a public exploit, this vulnerability requires immediate attention. Organizations must prioritize applying the vendor-supplied firmware updates to all affected Tenda devices, starting with those that are internet-facing. Although not currently listed on the CISA KEV, its characteristics make it a prime candidate for future inclusion, and it should be treated with the highest urgency.