CVE-2025-15048

A vulnerability was determined in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/CheckTools of the component HTTP Request Handler. Executing manipulation of the argument ipaddress can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:wh450_firmware:1.0.0.18:*:*:*:*:*:*:*
cpe:2.3:h:tenda:wh450:-:*:*:*:*:*:*:*

History

30 Dec 2025, 19:29

Type Values Removed Values Added
First Time Tenda
Tenda wh450 Firmware
Tenda wh450
CPE cpe:2.3:o:tenda:wh450_firmware:1.0.0.18:*:*:*:*:*:*:*
cpe:2.3:h:tenda:wh450:-:*:*:*:*:*:*:*
References () https://github.com/z472421519/BinaryAudit/blob/main/PoC/CMD/Tenda_WH450/CheckTools/CheckTools.md - () https://github.com/z472421519/BinaryAudit/blob/main/PoC/CMD/Tenda_WH450/CheckTools/CheckTools.md - Exploit, Third Party Advisory
References () https://github.com/z472421519/BinaryAudit/blob/main/PoC/CMD/Tenda_WH450/CheckTools/CheckTools.md#reproduce - () https://github.com/z472421519/BinaryAudit/blob/main/PoC/CMD/Tenda_WH450/CheckTools/CheckTools.md#reproduce - Exploit
References () https://vuldb.com/?ctiid.337853 - () https://vuldb.com/?ctiid.337853 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.337853 - () https://vuldb.com/?id.337853 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.720885 - () https://vuldb.com/?submit.720885 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

23 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-23 23:15

Updated : 2025-12-30 19:29


NVD link : CVE-2025-15048

Mitre link : CVE-2025-15048

CVE.ORG link : CVE-2025-15048


JSON object : View

Products Affected

tenda

  • wh450_firmware
  • wh450
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')