Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12273: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12273cvecve-2025-12273
Published: Mon Oct 27 2025 (10/27/2025, 12:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 10/27/2025, 12:53:02 UTC

Technical Analysis

CVE-2025-12273 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the function fromwebExcptypemanFilter, specifically in the handling of the 'page' parameter within the /goform/webExcptypemanFilter endpoint. An attacker can remotely manipulate this argument to cause a buffer overflow condition, which may allow arbitrary code execution or cause denial of service. The vulnerability requires no authentication or user interaction, increasing its exploitability. The CVSS v4.0 score of 8.7 reflects its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, indicating potential full device compromise. Although no patches have been released yet and no exploitation in the wild has been confirmed, the public availability of exploit code significantly raises the threat level. The vulnerability affects only version 1.0.0.1 of the Tenda CH22, a device commonly used in small to medium enterprise and consumer network environments. The lack of segmentation or filtering on the vulnerable endpoint increases the risk of exploitation. This vulnerability could be leveraged by attackers to gain persistent access to network infrastructure, intercept or manipulate traffic, or disrupt network services.

Potential Impact

For European organizations, exploitation of CVE-2025-12273 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive data, disruption of network availability, and potential lateral movement within corporate environments. Organizations relying on Tenda CH22 routers for critical connectivity—such as small businesses, branch offices, or remote sites—may face network outages or data breaches. The compromise of these devices could also serve as a foothold for attackers targeting larger enterprise networks or critical infrastructure. Given the public availability of exploit code, the risk of automated scanning and mass exploitation campaigns is elevated. This vulnerability could impact confidentiality by exposing internal communications, integrity by allowing manipulation of network traffic or device configurations, and availability by causing device crashes or network outages. The lack of patches increases the window of exposure, making timely mitigation essential to prevent potential attacks.

Mitigation Recommendations

1. Immediately identify and inventory all Tenda CH22 devices running firmware version 1.0.0.1 within the network. 2. Monitor vendor channels closely for official firmware updates or security advisories addressing CVE-2025-12273 and apply patches as soon as they become available. 3. Until patches are released, implement network-level protections such as firewall rules or intrusion prevention systems (IPS) to block or restrict access to the /goform/webExcptypemanFilter endpoint, especially from untrusted networks. 4. Employ network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data environments. 5. Conduct active monitoring and logging of network traffic to detect anomalous requests targeting the vulnerable endpoint. 6. Educate IT staff about the vulnerability and the importance of rapid response to any suspicious activity involving Tenda CH22 devices. 7. Consider replacing affected devices with alternative hardware if patching is not feasible within a reasonable timeframe. 8. Use vulnerability scanning tools to detect the presence of vulnerable firmware versions and verify remediation status regularly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:04:22.594Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff6796ba6dffc5e2f57798

Added to database: 10/27/2025, 12:37:42 PM

Last enriched: 10/27/2025, 12:53:02 PM

Last updated: 10/27/2025, 2:03:48 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats