CVE-2025-11117: Buffer Overflow in Tenda CH22
A vulnerability was determined in Tenda CH22 1.0.0.1. This vulnerability affects the function formWrlExtraGet of the file /goform/GstDhcpSetSer. This manipulation of the argument dips causes buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-11117 is a high-severity remote buffer overflow vulnerability found in the Tenda CH22 router, specifically version 1.0.0.1. The flaw exists in the function formWrlExtraGet within the /goform/GstDhcpSetSer endpoint. The vulnerability arises from improper handling of the 'dips' argument, which can be manipulated to cause a buffer overflow condition. This overflow can lead to memory corruption, potentially allowing an attacker to execute arbitrary code remotely without requiring user interaction or prior authentication. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its critical nature due to the ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction needed) and the high impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be actively used in the wild, the exploit code has been publicly disclosed, increasing the risk of imminent exploitation. The vulnerability affects a specific firmware version (1.0.0.1) of the Tenda CH22 device, which is a consumer-grade router commonly used in home and small office environments. The lack of available patches or mitigations at the time of disclosure further elevates the risk profile.
Potential Impact
For European organizations, especially small businesses and home offices relying on Tenda CH22 routers, this vulnerability poses a significant threat. Successful exploitation could allow attackers to gain unauthorized control over the router, leading to interception or manipulation of network traffic, deployment of malware, or pivoting into internal networks. This could compromise sensitive data confidentiality, disrupt network availability, and undermine the integrity of communications. Given the router’s role as a network gateway, exploitation could facilitate broader attacks such as man-in-the-middle, DNS hijacking, or persistent backdoors. The impact is particularly critical for organizations with limited IT security resources that may not promptly detect or mitigate such intrusions. Additionally, the vulnerability’s remote exploitability without authentication means attackers can target devices exposed to the internet, increasing the attack surface. The absence of patches at disclosure time means organizations must rely on interim mitigations, increasing operational risk.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Tenda CH22 devices from untrusted networks, especially the internet, to reduce exposure. Network segmentation should be employed to limit the router’s access to critical internal resources. Organizations should monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected connections to the /goform/GstDhcpSetSer endpoint or anomalous DHCP server configurations. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can help detect exploitation attempts. Users should regularly check Tenda’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. As a longer-term measure, organizations should consider replacing vulnerable devices with routers from vendors with stronger security track records and timely patch management. Additionally, disabling remote management features on the router, if enabled, can reduce the attack surface. Implementing strict firewall rules to restrict inbound traffic to trusted sources further mitigates risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11117: Buffer Overflow in Tenda CH22
Description
A vulnerability was determined in Tenda CH22 1.0.0.1. This vulnerability affects the function formWrlExtraGet of the file /goform/GstDhcpSetSer. This manipulation of the argument dips causes buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-11117 is a high-severity remote buffer overflow vulnerability found in the Tenda CH22 router, specifically version 1.0.0.1. The flaw exists in the function formWrlExtraGet within the /goform/GstDhcpSetSer endpoint. The vulnerability arises from improper handling of the 'dips' argument, which can be manipulated to cause a buffer overflow condition. This overflow can lead to memory corruption, potentially allowing an attacker to execute arbitrary code remotely without requiring user interaction or prior authentication. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its critical nature due to the ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction needed) and the high impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be actively used in the wild, the exploit code has been publicly disclosed, increasing the risk of imminent exploitation. The vulnerability affects a specific firmware version (1.0.0.1) of the Tenda CH22 device, which is a consumer-grade router commonly used in home and small office environments. The lack of available patches or mitigations at the time of disclosure further elevates the risk profile.
Potential Impact
For European organizations, especially small businesses and home offices relying on Tenda CH22 routers, this vulnerability poses a significant threat. Successful exploitation could allow attackers to gain unauthorized control over the router, leading to interception or manipulation of network traffic, deployment of malware, or pivoting into internal networks. This could compromise sensitive data confidentiality, disrupt network availability, and undermine the integrity of communications. Given the router’s role as a network gateway, exploitation could facilitate broader attacks such as man-in-the-middle, DNS hijacking, or persistent backdoors. The impact is particularly critical for organizations with limited IT security resources that may not promptly detect or mitigate such intrusions. Additionally, the vulnerability’s remote exploitability without authentication means attackers can target devices exposed to the internet, increasing the attack surface. The absence of patches at disclosure time means organizations must rely on interim mitigations, increasing operational risk.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Tenda CH22 devices from untrusted networks, especially the internet, to reduce exposure. Network segmentation should be employed to limit the router’s access to critical internal resources. Organizations should monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected connections to the /goform/GstDhcpSetSer endpoint or anomalous DHCP server configurations. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can help detect exploitation attempts. Users should regularly check Tenda’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. As a longer-term measure, organizations should consider replacing vulnerable devices with routers from vendors with stronger security track records and timely patch management. Additionally, disabling remote management features on the router, if enabled, can reduce the attack surface. Implementing strict firewall rules to restrict inbound traffic to trusted sources further mitigates risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-27T17:38:56.504Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d98ed7da6b87fcc8fca724
Added to database: 9/28/2025, 7:39:03 PM
Last enriched: 9/28/2025, 7:39:35 PM
Last updated: 9/28/2025, 9:43:30 PM
Views: 4
Related Threats
CVE-2025-11123: Stack-based Buffer Overflow in Tenda AC18
HighCVE-2025-11120: Buffer Overflow in Tenda AC8
HighCVE-2025-11119: Cross Site Scripting in itsourcecode Hostel Management System
MediumCVE-2025-11118: SQL Injection in CodeAstro Student Grading System
MediumCVE-2025-11116: SQL Injection in code-projects Simple Scheduling System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.