A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 24 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda wh450 Firmware
CPEs cpe:2.3:h:tenda:wh450:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:wh450_firmware:1.0.0.18:*:*:*:*:*:*:*
Vendors & Products Tenda wh450 Firmware

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda wh450
Vendors & Products Tenda
Tenda wh450

Thu, 18 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
Title Tenda WH450 HTTP Request wirelessRestart stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-12-18T17:52:48.670Z

Reserved: 2025-12-18T11:11:50.520Z

Link: CVE-2025-14878

cve-icon Vulnrichment

Updated: 2025-12-18T17:52:42.798Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-18T16:15:52.960

Modified: 2025-12-24T15:18:36.810

Link: CVE-2025-14878

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-19T09:15:55Z

Weaknesses