CVE-2025-12273: Buffer Overflow in Tenda CH22
A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-12273 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the function fromwebExcptypemanFilter, specifically in the handling of the 'page' parameter within the /goform/webExcptypemanFilter endpoint. An attacker can remotely manipulate this argument to cause a buffer overflow condition, which may allow arbitrary code execution or cause denial of service. The vulnerability requires no authentication or user interaction, increasing its exploitability. The CVSS v4.0 score of 8.7 reflects its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, indicating potential full device compromise. Although no patches have been released yet and no exploitation in the wild has been confirmed, the public availability of exploit code significantly raises the threat level. The vulnerability affects only version 1.0.0.1 of the Tenda CH22, a device commonly used in small to medium enterprise and consumer network environments. The lack of segmentation or filtering on the vulnerable endpoint increases the risk of exploitation. This vulnerability could be leveraged by attackers to gain persistent access to network infrastructure, intercept or manipulate traffic, or disrupt network services.
Potential Impact
For European organizations, exploitation of CVE-2025-12273 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive data, disruption of network availability, and potential lateral movement within corporate environments. Organizations relying on Tenda CH22 routers for critical connectivity—such as small businesses, branch offices, or remote sites—may face network outages or data breaches. The compromise of these devices could also serve as a foothold for attackers targeting larger enterprise networks or critical infrastructure. Given the public availability of exploit code, the risk of automated scanning and mass exploitation campaigns is elevated. This vulnerability could impact confidentiality by exposing internal communications, integrity by allowing manipulation of network traffic or device configurations, and availability by causing device crashes or network outages. The lack of patches increases the window of exposure, making timely mitigation essential to prevent potential attacks.
Mitigation Recommendations
1. Immediately identify and inventory all Tenda CH22 devices running firmware version 1.0.0.1 within the network. 2. Monitor vendor channels closely for official firmware updates or security advisories addressing CVE-2025-12273 and apply patches as soon as they become available. 3. Until patches are released, implement network-level protections such as firewall rules or intrusion prevention systems (IPS) to block or restrict access to the /goform/webExcptypemanFilter endpoint, especially from untrusted networks. 4. Employ network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data environments. 5. Conduct active monitoring and logging of network traffic to detect anomalous requests targeting the vulnerable endpoint. 6. Educate IT staff about the vulnerability and the importance of rapid response to any suspicious activity involving Tenda CH22 devices. 7. Consider replacing affected devices with alternative hardware if patching is not feasible within a reasonable timeframe. 8. Use vulnerability scanning tools to detect the presence of vulnerable firmware versions and verify remediation status regularly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-12273: Buffer Overflow in Tenda CH22
Description
A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-12273 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the function fromwebExcptypemanFilter, specifically in the handling of the 'page' parameter within the /goform/webExcptypemanFilter endpoint. An attacker can remotely manipulate this argument to cause a buffer overflow condition, which may allow arbitrary code execution or cause denial of service. The vulnerability requires no authentication or user interaction, increasing its exploitability. The CVSS v4.0 score of 8.7 reflects its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, indicating potential full device compromise. Although no patches have been released yet and no exploitation in the wild has been confirmed, the public availability of exploit code significantly raises the threat level. The vulnerability affects only version 1.0.0.1 of the Tenda CH22, a device commonly used in small to medium enterprise and consumer network environments. The lack of segmentation or filtering on the vulnerable endpoint increases the risk of exploitation. This vulnerability could be leveraged by attackers to gain persistent access to network infrastructure, intercept or manipulate traffic, or disrupt network services.
Potential Impact
For European organizations, exploitation of CVE-2025-12273 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive data, disruption of network availability, and potential lateral movement within corporate environments. Organizations relying on Tenda CH22 routers for critical connectivity—such as small businesses, branch offices, or remote sites—may face network outages or data breaches. The compromise of these devices could also serve as a foothold for attackers targeting larger enterprise networks or critical infrastructure. Given the public availability of exploit code, the risk of automated scanning and mass exploitation campaigns is elevated. This vulnerability could impact confidentiality by exposing internal communications, integrity by allowing manipulation of network traffic or device configurations, and availability by causing device crashes or network outages. The lack of patches increases the window of exposure, making timely mitigation essential to prevent potential attacks.
Mitigation Recommendations
1. Immediately identify and inventory all Tenda CH22 devices running firmware version 1.0.0.1 within the network. 2. Monitor vendor channels closely for official firmware updates or security advisories addressing CVE-2025-12273 and apply patches as soon as they become available. 3. Until patches are released, implement network-level protections such as firewall rules or intrusion prevention systems (IPS) to block or restrict access to the /goform/webExcptypemanFilter endpoint, especially from untrusted networks. 4. Employ network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data environments. 5. Conduct active monitoring and logging of network traffic to detect anomalous requests targeting the vulnerable endpoint. 6. Educate IT staff about the vulnerability and the importance of rapid response to any suspicious activity involving Tenda CH22 devices. 7. Consider replacing affected devices with alternative hardware if patching is not feasible within a reasonable timeframe. 8. Use vulnerability scanning tools to detect the presence of vulnerable firmware versions and verify remediation status regularly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-26T16:04:22.594Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff6796ba6dffc5e2f57798
Added to database: 10/27/2025, 12:37:42 PM
Last enriched: 10/27/2025, 12:53:02 PM
Last updated: 10/27/2025, 2:03:48 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-50055: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OpenVPN Access Server
UnknownCVE-2025-12282: Cross Site Scripting in code-projects Client Details System
MediumCVE-2025-12281: Cross Site Scripting in code-projects Client Details System
MediumCVE-2025-12280: Cross Site Scripting in code-projects Client Details System
MediumCVE-2025-60291: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.