CVE-2025-12236: Buffer Overflow in Tenda CH22
A vulnerability was determined in Tenda CH22 1.0.0.1. This issue affects the function fromDhcpListClient of the file /goform/DhcpListClient. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-12236 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability exists in the fromDhcpListClient function within the /goform/DhcpListClient endpoint, where improper handling of the 'page' argument leads to a buffer overflow condition. This flaw allows a remote attacker to send specially crafted requests to the router without requiring authentication or user interaction, triggering the overflow. The consequence of this overflow can be arbitrary code execution, enabling attackers to compromise the device fully, potentially gaining control over network traffic, intercepting data, or launching further attacks within the network. The vulnerability has been assigned a CVSS 4.0 score of 8.7, reflecting its high severity due to the network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of imminent attacks. The vulnerability affects only firmware version 1.0.0.1, and no official patches have been linked yet, emphasizing the need for vigilance and proactive mitigation by affected users.
Potential Impact
For European organizations, the exploitation of CVE-2025-12236 could lead to severe consequences including unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within corporate environments. Given that routers like the Tenda CH22 often serve as the primary gateway for internet connectivity, a compromised device could undermine the confidentiality, integrity, and availability of organizational communications. Critical sectors such as finance, healthcare, manufacturing, and government agencies could face operational disruptions and data breaches. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if exploit code becomes widely available. Additionally, the lack of current patches means organizations must rely on interim controls, increasing operational complexity and risk exposure.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify any Tenda CH22 devices running firmware version 1.0.0.1. Until an official patch is released, network administrators should restrict access to the /goform/DhcpListClient endpoint by implementing firewall rules or access control lists that limit management interface exposure to trusted internal networks only. Network segmentation should be employed to isolate vulnerable devices from critical systems. Monitoring network traffic for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts. Where possible, replace affected devices with updated hardware or firmware versions that are not vulnerable. Engage with Tenda support channels to obtain information on forthcoming patches and apply them promptly once available. Additionally, implement intrusion detection/prevention systems (IDS/IPS) signatures tailored to detect exploitation attempts of this specific vulnerability. Regularly update and audit network device configurations to minimize attack surfaces.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-12236: Buffer Overflow in Tenda CH22
Description
A vulnerability was determined in Tenda CH22 1.0.0.1. This issue affects the function fromDhcpListClient of the file /goform/DhcpListClient. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-12236 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability exists in the fromDhcpListClient function within the /goform/DhcpListClient endpoint, where improper handling of the 'page' argument leads to a buffer overflow condition. This flaw allows a remote attacker to send specially crafted requests to the router without requiring authentication or user interaction, triggering the overflow. The consequence of this overflow can be arbitrary code execution, enabling attackers to compromise the device fully, potentially gaining control over network traffic, intercepting data, or launching further attacks within the network. The vulnerability has been assigned a CVSS 4.0 score of 8.7, reflecting its high severity due to the network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of imminent attacks. The vulnerability affects only firmware version 1.0.0.1, and no official patches have been linked yet, emphasizing the need for vigilance and proactive mitigation by affected users.
Potential Impact
For European organizations, the exploitation of CVE-2025-12236 could lead to severe consequences including unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within corporate environments. Given that routers like the Tenda CH22 often serve as the primary gateway for internet connectivity, a compromised device could undermine the confidentiality, integrity, and availability of organizational communications. Critical sectors such as finance, healthcare, manufacturing, and government agencies could face operational disruptions and data breaches. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if exploit code becomes widely available. Additionally, the lack of current patches means organizations must rely on interim controls, increasing operational complexity and risk exposure.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify any Tenda CH22 devices running firmware version 1.0.0.1. Until an official patch is released, network administrators should restrict access to the /goform/DhcpListClient endpoint by implementing firewall rules or access control lists that limit management interface exposure to trusted internal networks only. Network segmentation should be employed to isolate vulnerable devices from critical systems. Monitoring network traffic for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts. Where possible, replace affected devices with updated hardware or firmware versions that are not vulnerable. Engage with Tenda support channels to obtain information on forthcoming patches and apply them promptly once available. Additionally, implement intrusion detection/prevention systems (IDS/IPS) signatures tailored to detect exploitation attempts of this specific vulnerability. Regularly update and audit network device configurations to minimize attack surfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-25T17:04:00.958Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff1b307e25bac6d3f8f10f
Added to database: 10/27/2025, 7:11:44 AM
Last enriched: 11/3/2025, 8:38:53 AM
Last updated: 12/11/2025, 8:58:45 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-7096: SQL Injection in code-projects Faculty Management System
MediumCVE-2025-64701: Privilege chaining in QualitySoft Corporation QND Premium/Advance/Standard
HighCVE-2025-14512: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-67694
UnknownCVE-2025-67693
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.