A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/DhcpListClient of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 22 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda wh450 Firmware
CPEs cpe:2.3:h:tenda:wh450:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:wh450_firmware:1.0.0.18:*:*:*:*:*:*:*
Vendors & Products Tenda wh450 Firmware

Mon, 15 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda wh450
Vendors & Products Tenda
Tenda wh450

Sun, 14 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/DhcpListClient of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
Title Tenda WH450 HTTP Request DhcpListClient stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-12-15T20:45:42.943Z

Reserved: 2025-12-13T13:34:13.890Z

Link: CVE-2025-14665

cve-icon Vulnrichment

Updated: 2025-12-15T20:45:36.261Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-14T15:15:47.013

Modified: 2025-12-22T18:13:20.683

Link: CVE-2025-14665

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-15T14:06:09Z

Weaknesses