Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12236: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12236cvecve-2025-12236
Published: Mon Oct 27 2025 (10/27/2025, 06:22:47 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A vulnerability was determined in Tenda CH22 1.0.0.1. This issue affects the function fromDhcpListClient of the file /goform/DhcpListClient. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/03/2025, 08:38:53 UTC

Technical Analysis

CVE-2025-12236 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability exists in the fromDhcpListClient function within the /goform/DhcpListClient endpoint, where improper handling of the 'page' argument leads to a buffer overflow condition. This flaw allows a remote attacker to send specially crafted requests to the router without requiring authentication or user interaction, triggering the overflow. The consequence of this overflow can be arbitrary code execution, enabling attackers to compromise the device fully, potentially gaining control over network traffic, intercepting data, or launching further attacks within the network. The vulnerability has been assigned a CVSS 4.0 score of 8.7, reflecting its high severity due to the network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of imminent attacks. The vulnerability affects only firmware version 1.0.0.1, and no official patches have been linked yet, emphasizing the need for vigilance and proactive mitigation by affected users.

Potential Impact

For European organizations, the exploitation of CVE-2025-12236 could lead to severe consequences including unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within corporate environments. Given that routers like the Tenda CH22 often serve as the primary gateway for internet connectivity, a compromised device could undermine the confidentiality, integrity, and availability of organizational communications. Critical sectors such as finance, healthcare, manufacturing, and government agencies could face operational disruptions and data breaches. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if exploit code becomes widely available. Additionally, the lack of current patches means organizations must rely on interim controls, increasing operational complexity and risk exposure.

Mitigation Recommendations

Organizations should immediately inventory their network infrastructure to identify any Tenda CH22 devices running firmware version 1.0.0.1. Until an official patch is released, network administrators should restrict access to the /goform/DhcpListClient endpoint by implementing firewall rules or access control lists that limit management interface exposure to trusted internal networks only. Network segmentation should be employed to isolate vulnerable devices from critical systems. Monitoring network traffic for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts. Where possible, replace affected devices with updated hardware or firmware versions that are not vulnerable. Engage with Tenda support channels to obtain information on forthcoming patches and apply them promptly once available. Additionally, implement intrusion detection/prevention systems (IDS/IPS) signatures tailored to detect exploitation attempts of this specific vulnerability. Regularly update and audit network device configurations to minimize attack surfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T17:04:00.958Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff1b307e25bac6d3f8f10f

Added to database: 10/27/2025, 7:11:44 AM

Last enriched: 11/3/2025, 8:38:53 AM

Last updated: 12/11/2025, 8:58:45 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats