Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12272: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12272cvecve-2025-12272
Published: Mon Oct 27 2025 (10/27/2025, 12:02:14 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A security flaw has been discovered in Tenda CH22 1.0.0.1. This impacts the function fromAddressNat of the file /goform/addressNat. Performing manipulation of the argument page results in buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 11/03/2025, 12:25:08 UTC

Technical Analysis

CVE-2025-12272 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the fromAddressNat function within the /goform/addressNat endpoint. Specifically, the flaw is triggered by manipulating the 'page' argument, which leads to a buffer overflow condition. This type of vulnerability occurs when input data exceeds the allocated buffer size, potentially overwriting adjacent memory and enabling arbitrary code execution or system crashes. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS v4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges needed. While no confirmed exploits are observed in the wild, a public proof-of-concept exploit has been released, increasing the likelihood of active exploitation. The vulnerability affects only the specific firmware version 1.0.0.1, and no official patches have been linked yet. Attackers exploiting this flaw could gain control over the router, intercept or manipulate network traffic, or disrupt network availability, posing serious risks to organizational networks.

Potential Impact

For European organizations, this vulnerability could lead to significant operational disruptions and data breaches. Compromised Tenda CH22 routers could allow attackers to intercept sensitive communications, manipulate network configurations, or launch further attacks within the internal network. Critical infrastructure sectors such as telecommunications, finance, and government agencies using these devices may face heightened risks. The remote and unauthenticated nature of the exploit increases exposure, especially for organizations with internet-facing routers or poorly segmented networks. The potential for denial of service or full device compromise could impact business continuity and regulatory compliance, including GDPR mandates on data protection. Additionally, exploitation could serve as a foothold for lateral movement or persistent threats within European enterprise environments.

Mitigation Recommendations

Immediate mitigation should focus on isolating affected Tenda CH22 devices from untrusted networks, especially the internet, to reduce exposure. Network segmentation and firewall rules should restrict access to the /goform/addressNat endpoint. Organizations should monitor network traffic for unusual requests targeting the 'page' parameter and implement intrusion detection signatures where possible. Since no official patch is currently available, consider temporary device replacement or firmware rollback if a secure version exists. Vendors and users should prioritize obtaining and applying firmware updates once released. Additionally, conducting regular vulnerability scans and penetration tests can help identify vulnerable devices. Employing network behavior anomaly detection can also assist in early detection of exploitation attempts. Finally, educating IT staff about this specific threat will improve incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:04:19.652Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff609aba6dffc5e2ea040b

Added to database: 10/27/2025, 12:07:54 PM

Last enriched: 11/3/2025, 12:25:08 PM

Last updated: 12/8/2025, 10:32:47 AM

Views: 154

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats