CVE-2025-15048

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Tenda WH450 routers by injecting malicious input into the 'ipaddress' parameter of the HTTP request handler. Attackers can exploit this without authentication to gain control of affected devices. Users running Tenda WH450 firmware version 1.0.0.18 are affected.

💻 Affected Systems

Products:
  • Tenda WH450
Versions: 1.0.0.18
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the HTTP request handler component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept network traffic, install persistent backdoors, pivot to internal networks, or use the device for botnet activities.

🟠

Likely Case

Remote code execution leading to router compromise, credential theft, DNS hijacking, and network surveillance.

🟢

If Mitigated

Limited impact if network segmentation isolates the router and external access is restricted.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP requests, making internet-facing devices immediately vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to pivot through the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept demonstrates command injection via crafted HTTP requests to /goform/CheckTools endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Tenda's official website for firmware updates. If available, download and install the latest firmware through the router's web interface.

🔧 Temporary Workarounds

Block External Access

all

Prevent external access to the router's web interface by configuring firewall rules to block inbound HTTP/HTTPS traffic to the router from untrusted networks.

Network Segmentation

all

Isolate the router on a separate VLAN to limit potential lateral movement if compromised.

🧯 If You Can't Patch

  • Replace affected devices with patched or alternative models
  • Implement strict network monitoring and intrusion detection for suspicious HTTP requests to /goform/CheckTools

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status or System Tools. If version is 1.0.0.18, the device is vulnerable.

Check Version:

Not applicable - check via router web interface

Verify Fix Applied:

Verify firmware version has been updated to a version later than 1.0.0.18.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /goform/CheckTools with unusual ipaddress parameters containing shell metacharacters
  • Unusual command execution in router logs

Network Indicators:

  • HTTP POST requests to /goform/CheckTools with command injection payloads in ipaddress parameter
  • Outbound connections from router to unexpected destinations

SIEM Query:

http.url:"/goform/CheckTools" AND http.param.ipaddress:("|" OR ";" OR "&" OR "`" OR "$")

🔗 References

📤 Share & Export