Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12274: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12274cvecve-2025-12274
Published: Mon Oct 27 2025 (10/27/2025, 12:32:12 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

CVE-2025-12274 is a high-severity buffer overflow vulnerability in the Tenda CH22 router firmware version 1. 0. 0. 1. It arises from improper handling of the 'page' argument in the fromP2pListFilter function within the /goform/P2pListFilter endpoint. This flaw allows remote attackers to execute arbitrary code without authentication or user interaction, potentially compromising confidentiality, integrity, and availability of affected devices. The vulnerability has a CVSS 4. 0 score of 8. 7, indicating high impact and ease of exploitation. Although no public exploits are currently observed in the wild, the exploit code has been disclosed, increasing the risk of imminent attacks.

AI-Powered Analysis

AILast updated: 11/03/2025, 13:22:52 UTC

Technical Analysis

CVE-2025-12274 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The flaw exists in the fromP2pListFilter function, specifically in the handling of the 'page' argument passed to the /goform/P2pListFilter endpoint. Improper validation or bounds checking of this input allows an attacker to overflow a buffer, leading to potential arbitrary code execution on the device. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 score of 8.7 reflects the vulnerability's high impact on confidentiality, integrity, and availability, as successful exploitation could allow attackers to take full control of the router, intercept or manipulate network traffic, or disrupt network services. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects a widely used consumer and small business router model, which may be deployed in various organizational environments. The absence of an official patch at the time of disclosure necessitates immediate mitigation efforts to reduce exposure. The vulnerability's exploitation vector is network-based, with low attack complexity and no privileges or user interaction required, making it a critical risk for affected deployments.

Potential Impact

For European organizations, exploitation of CVE-2025-12274 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive communications, and disruption of network availability. Compromised routers can serve as entry points for lateral movement within corporate networks or as platforms for launching further attacks such as man-in-the-middle, data exfiltration, or denial-of-service. Small and medium enterprises relying on Tenda CH22 devices for internet connectivity or VPN termination are particularly vulnerable. Critical infrastructure sectors such as finance, healthcare, and government agencies could face operational disruptions or data breaches if these devices are compromised. Additionally, the widespread use of Tenda routers in home offices due to increased remote work trends in Europe amplifies the risk of supply chain and endpoint attacks. The remote, unauthenticated nature of the exploit means attackers can target vulnerable devices en masse, potentially leading to large-scale botnets or coordinated attacks affecting multiple organizations across Europe.

Mitigation Recommendations

1. Immediately inventory all Tenda CH22 devices running firmware version 1.0.0.1 within the organization. 2. Monitor vendor communications closely for official firmware updates or patches addressing CVE-2025-12274 and apply them promptly upon release. 3. Until patches are available, restrict network access to the /goform/P2pListFilter endpoint by implementing firewall rules or access control lists that limit inbound traffic to trusted sources only. 4. Segment networks to isolate vulnerable routers from critical systems and sensitive data environments to contain potential compromises. 5. Deploy intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics tuned to detect exploitation attempts targeting this vulnerability. 6. Conduct regular network traffic analysis to identify anomalous requests to the vulnerable endpoint or unusual router behavior. 7. Educate IT staff and users about the risks associated with this vulnerability and encourage reporting of suspicious network activity. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed or infeasible. 9. Implement strong network authentication and encryption mechanisms to reduce the impact of potential router compromise. 10. Maintain up-to-date backups and incident response plans to enable rapid recovery in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:04:25.675Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff6796ba6dffc5e2f5779f

Added to database: 10/27/2025, 12:37:42 PM

Last enriched: 11/3/2025, 1:22:52 PM

Last updated: 12/10/2025, 12:12:54 PM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats