Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12272: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12272cvecve-2025-12272
Published: Mon Oct 27 2025 (10/27/2025, 12:02:14 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A security flaw has been discovered in Tenda CH22 1.0.0.1. This impacts the function fromAddressNat of the file /goform/addressNat. Performing manipulation of the argument page results in buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 10/27/2025, 12:08:19 UTC

Technical Analysis

CVE-2025-12272 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The flaw exists in the fromAddressNat function, specifically in the handling of the 'page' parameter within the /goform/addressNat endpoint. When an attacker sends a specially crafted request manipulating this argument, it causes a buffer overflow condition. This vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution, allowing attackers to take control of the device, disrupt network traffic, or pivot to internal networks. The CVSS v4.0 score of 8.7 reflects its high severity, with a vector indicating network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. While no confirmed exploits in the wild have been reported yet, the public release of exploit code increases the likelihood of imminent attacks. The vulnerability affects only version 1.0.0.1 of the firmware, and no official patch has been linked yet, emphasizing the need for immediate mitigation steps. This flaw is critical for network security as routers are a primary gateway device, and compromise can lead to widespread network infiltration or denial of service.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for small and medium enterprises or home office setups that commonly deploy Tenda CH22 routers due to their cost-effectiveness. Successful exploitation can lead to full device compromise, allowing attackers to intercept, modify, or block network traffic, potentially leading to data breaches, espionage, or disruption of business operations. Critical infrastructure relying on these devices could experience outages or unauthorized access. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the threat landscape. Additionally, the public availability of exploit code may lead to rapid weaponization by cybercriminals or state-sponsored actors targeting European networks. The impact extends beyond individual devices, as compromised routers can serve as footholds for lateral movement within corporate or governmental networks, amplifying the damage.

Mitigation Recommendations

1. Immediate network segmentation to isolate Tenda CH22 devices from critical systems and sensitive data. 2. Implement strict firewall rules to block external access to the /goform/addressNat endpoint or restrict management interfaces to trusted IP addresses only. 3. Monitor network traffic for unusual requests targeting the vulnerable endpoint and deploy intrusion detection/prevention systems with updated signatures. 4. Engage with Tenda support channels to obtain firmware updates or security advisories; if unavailable, consider temporary replacement of affected devices with more secure alternatives. 5. Conduct thorough audits of all network devices to identify any running the vulnerable firmware version 1.0.0.1. 6. Educate IT staff on the vulnerability and ensure rapid incident response plans are in place in case of exploitation. 7. Apply network-level mitigations such as deep packet inspection to detect and block exploit attempts. 8. Maintain up-to-date backups and recovery procedures to minimize downtime in case of device compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:04:19.652Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff609aba6dffc5e2ea040b

Added to database: 10/27/2025, 12:07:54 PM

Last enriched: 10/27/2025, 12:08:19 PM

Last updated: 10/27/2025, 2:11:37 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats