Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12273: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12273cvecve-2025-12273
Published: Mon Oct 27 2025 (10/27/2025, 12:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

CVE-2025-12273 is a high-severity buffer overflow vulnerability in Tenda CH22 version 1. 0. 0. 1, specifically in the fromwebExcptypemanFilter function of the /goform/webExcptypemanFilter file. The flaw allows remote attackers to manipulate the 'page' argument to trigger a buffer overflow without requiring authentication or user interaction. Exploitation could lead to full compromise of the device’s confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, a public exploit exists, increasing the risk of imminent attacks. This vulnerability affects network devices commonly used in home and small office environments, which may be deployed across European organizations. The lack of available patches necessitates immediate mitigation efforts to reduce exposure. European countries with significant deployments of Tenda networking equipment and critical infrastructure relying on such devices are at higher risk.

AI-Powered Analysis

AILast updated: 11/03/2025, 13:22:35 UTC

Technical Analysis

CVE-2025-12273 identifies a buffer overflow vulnerability in Tenda CH22 firmware version 1.0.0.1, located in the function fromwebExcptypemanFilter within the /goform/webExcptypemanFilter endpoint. The vulnerability arises from improper handling of the 'page' argument, which can be manipulated by an unauthenticated remote attacker to overflow a buffer. This overflow can lead to arbitrary code execution or denial of service on the affected device. The attack vector is network-based (AV:N), requiring no authentication (AT:N) or user interaction (UI:N), and has low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H), making it critical for device security. Although no exploits have been observed in the wild yet, a public exploit is available, increasing the likelihood of exploitation. The affected product, Tenda CH22, is a consumer-grade networking device often used in home and small office environments, which may also be present in enterprise edge networks. The absence of an official patch or vendor advisory increases the urgency for organizations to apply compensating controls. The vulnerability’s exploitation could allow attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network services.

Potential Impact

For European organizations, exploitation of CVE-2025-12273 could result in significant security breaches including unauthorized access to internal networks, interception of sensitive communications, and disruption of network availability. Compromise of Tenda CH22 devices could serve as a foothold for lateral movement within corporate or governmental networks, potentially leading to data exfiltration or sabotage. Small and medium enterprises, as well as home office setups increasingly integrated into corporate networks, are particularly vulnerable due to the widespread use of consumer-grade devices like the Tenda CH22. The impact extends beyond individual organizations to critical infrastructure sectors that rely on these devices for network connectivity. Given the high CVSS score and the availability of a public exploit, the threat level is elevated, and successful exploitation could undermine trust in network security and lead to regulatory and compliance repercussions under European data protection laws.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include isolating Tenda CH22 devices on separate VLANs or network segments to limit exposure. Restrict remote management access to trusted IP addresses and disable any unnecessary web management interfaces. Employ network intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious requests targeting the /goform/webExcptypemanFilter endpoint. Regularly audit network devices for firmware versions and replace or upgrade vulnerable devices where possible. Educate users and administrators about the risks of using consumer-grade networking equipment in enterprise environments. Additionally, consider deploying network access control (NAC) solutions to enforce device compliance and prevent unauthorized devices from connecting. Maintain vigilant monitoring for signs of exploitation attempts and prepare incident response plans specific to network device compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:04:22.594Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff6796ba6dffc5e2f57798

Added to database: 10/27/2025, 12:37:42 PM

Last enriched: 11/3/2025, 1:22:35 PM

Last updated: 12/9/2025, 3:19:12 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats