Cyber Posture

CVE-2025-15010

CriticalPublic PoC

Published: 22 December 2025

Published
22 December 2025
Modified
30 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability has been found in Tenda WH450 1.0.0.18. This issue affects some unknown processing of the file /goform/SafeUrlFilter. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has…

more

been disclosed to the public and may be used.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through firmware patching directly eliminates the stack-based buffer overflow in the /goform/SafeUrlFilter endpoint of Tenda WH450 1.0.0.18.

prevent

Validating the 'page' argument in information inputs prevents the manipulation that triggers the stack-based buffer overflow.

prevent

Memory protection mechanisms such as stack canaries and non-executable stacks mitigate exploitation of the stack-based buffer overflow vulnerability.

Security SummaryAI

CVE-2025-15010 is a stack-based buffer overflow vulnerability (CWE-119, CWE-121) affecting Tenda WH450 routers on firmware version 1.0.0.18. The flaw occurs in an unknown processing component handling the /goform/SafeUrlFilter file, where manipulation of the "page" argument triggers the overflow.

The vulnerability enables remote exploitation over the network with low complexity, requiring no privileges or user interaction, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Attackers can achieve high impacts on confidentiality, integrity, and availability, potentially leading to full device compromise such as arbitrary code execution.

References point to a publicly disclosed proof-of-concept on GitHub, including reproduction steps for the SafeUrlFilter buffer overflow in Tenda WH450. VulDB advisories document the issue under CTI ID 337716, noting recent submission and public exploit availability that may facilitate active use. No patches are mentioned in the provided details.

Details

CWE(s)

Affected Products

tenda
wh450 firmware
1.0.0.18

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated stack-based buffer overflow in router web endpoint /goform/SafeUrlFilter enables remote exploitation of public-facing application for potential RCE.

References