Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12233: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12233cvecve-2025-12233
Published: Mon Oct 27 2025 (10/27/2025, 06:22:17 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 11/03/2025, 07:48:41 UTC

Technical Analysis

CVE-2025-12233 identifies a critical buffer overflow vulnerability in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the fromSafeUrlFilter function of the /goform/SafeUrlFilter endpoint, where improper handling of the 'page' parameter allows an attacker to overflow a buffer. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution, enabling attackers to take control of the device, disrupt network services, or pivot into internal networks. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with ease of exploitation. Although no active exploitation has been reported, the availability of a public exploit increases the urgency for remediation. The vulnerability affects only version 1.0.0.1 of the firmware, and no official patches have been linked yet, indicating that users must rely on interim mitigations. The attack vector is network-based, targeting the router’s web management interface, which is often exposed or accessible within enterprise and home networks. This vulnerability poses a significant threat to network infrastructure stability and security, especially in environments where Tenda CH22 devices are deployed.

Potential Impact

For European organizations, the exploitation of CVE-2025-12233 could lead to severe consequences including unauthorized remote control of network routers, disruption of network availability, interception or manipulation of network traffic, and potential lateral movement within corporate networks. This could compromise sensitive data confidentiality and integrity, disrupt business operations, and damage organizational reputation. Critical sectors such as finance, healthcare, and government agencies relying on Tenda CH22 devices for connectivity could experience operational outages or data breaches. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in organizations with exposed or poorly segmented network management interfaces. Additionally, the presence of a public exploit lowers the barrier for attackers, including cybercriminals and state-sponsored actors, to weaponize this vulnerability against European targets. The impact is exacerbated by the lack of available patches, requiring organizations to implement compensating controls to reduce exposure.

Mitigation Recommendations

1. Immediately identify and inventory all Tenda CH22 devices running firmware version 1.0.0.1 within the network. 2. Restrict access to the /goform/SafeUrlFilter endpoint by implementing network-level controls such as firewall rules or access control lists to limit management interface exposure to trusted IP addresses only. 3. Employ network segmentation to isolate vulnerable devices from critical network segments and sensitive data repositories. 4. Monitor network traffic for unusual or suspicious requests targeting the 'page' parameter of the SafeUrlFilter endpoint, using intrusion detection/prevention systems with custom signatures. 5. Disable remote management interfaces on Tenda CH22 devices if not strictly necessary, or enforce VPN access with strong authentication for remote administration. 6. Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available and plan for prompt deployment. 7. Consider replacing vulnerable devices with models from vendors with more robust security update practices if patching is delayed. 8. Educate network administrators about the risks and signs of exploitation related to this vulnerability to enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T17:03:50.428Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff1b307e25bac6d3f8f0fa

Added to database: 10/27/2025, 7:11:44 AM

Last enriched: 11/3/2025, 7:48:41 AM

Last updated: 12/8/2025, 3:49:50 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats