Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-15046 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: CVE-2025-15046 is a **Stack Buffer Overflow** in Tenda WH450. πŸ“‰ **Consequences**: Attackers can execute arbitrary code, leading to full device compromise. πŸ’₯ **Impact**: High severity (CVSS 9.8).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-121** (Stack-based Buffer Overflow). πŸ› **Flaw**: Improper handling of the `netmsk` parameter in the `/goform/PPTPClient` HTTP Request Handler.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Tenda (China). πŸ“¦ **Product**: WH450 Wireless Access Point. πŸ“… **Affected Version**: **1.0.0.18** specifically. ⚠️ **Scope**: Only this specific firmware version is confirmed vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Remote Code Execution (RCE). πŸ•΅οΈ **Data Access**: Full system control. πŸ”“ **Capabilities**: Hackers can read/write any file, install backdoors, or pivot to internal networks.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. 🌐 **Access**: Network-based (AV:N). πŸ”‘ **Auth**: None required (PR:N). πŸ‘οΈ **UI**: No user interaction needed (UI:N). 🎯 **Complexity**: Low (AC:L). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exploit**: **YES**. πŸ“‚ **Source**: GitHub PoC available (`z472421519/BinaryAudit`). πŸ“œ **Details**: Specific PPTPClient overflow PoC is documented.…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Check**: Scan for Tenda WH450 devices. πŸ“‘ **Target**: Look for HTTP requests to `/goform/PPTPClient`. πŸ“‹ **Parameter**: Check if `netmsk` parameter is present.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Official Patch**: **Unknown/Not Listed**. πŸ“„ **References**: No official advisory link provided in data. πŸ”„ **Status**: Vendor page (tenda.com.cn) listed, but no patch note confirmed.…

Q9What if no patch? (Workaround)

🚧 **Workaround**: Block external access to the device. 🚫 **Network**: Disable PPTP service if possible. πŸ›‘ **Firewall**: Restrict HTTP access to `/goform/PPTPClient` to trusted IPs only.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: Immediate action required. πŸ“‰ **Risk**: High CVSS (9.8) + Public PoC = Imminent Threat. πŸƒ **Action**: Patch immediately or isolate from the internet NOW.