Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12274: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12274cvecve-2025-12274
Published: Mon Oct 27 2025 (10/27/2025, 12:32:12 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A security vulnerability has been detected in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 10/27/2025, 12:52:48 UTC

Technical Analysis

CVE-2025-12274 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the fromP2pListFilter function, specifically in the handling of the 'page' argument passed to the /goform/P2pListFilter endpoint. Improper validation or sanitization of this input allows an attacker to overflow a buffer, which can lead to arbitrary code execution or denial of service on the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its severity and ease of exploitation. The CVSS 4.0 score of 8.7 reflects its high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. The exploit has been publicly disclosed, which raises the likelihood of exploitation despite no current reports of active attacks. The vulnerability affects a widely deployed consumer and small business router model, which is often used in home and office environments, potentially exposing internal networks to compromise. The lack of an official patch or firmware update from Tenda at the time of disclosure means that affected users must rely on alternative mitigations such as network segmentation, firewall rules, or device replacement to reduce risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for remote compromise of network routers, which serve as critical gateways for internal networks. Exploitation could allow attackers to execute arbitrary code, leading to interception or manipulation of network traffic, installation of persistent malware, or disruption of network services. This could compromise sensitive data confidentiality, disrupt business operations, and undermine trust in network infrastructure. Small and medium enterprises, as well as home office setups using Tenda CH22 devices, are particularly vulnerable. The public availability of exploit code increases the risk of opportunistic attacks, including those by cybercriminals or state-sponsored actors targeting European entities. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within corporate networks or for launching broader attacks against connected systems. The absence of patches exacerbates the threat, necessitating immediate attention to mitigate exposure.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement several targeted mitigations: 1) Immediately identify and inventory all Tenda CH22 devices running firmware version 1.0.0.1 within their networks. 2) Isolate affected devices on segmented network zones with strict access controls to limit exposure. 3) Deploy network-level intrusion detection and prevention systems (IDS/IPS) configured to detect anomalous traffic patterns targeting /goform/P2pListFilter or suspicious buffer overflow attempts. 4) Restrict remote management access to these devices by disabling WAN-side administration and enforcing strong access control lists. 5) Where possible, replace vulnerable Tenda CH22 routers with devices from vendors providing timely security updates and support. 6) Monitor threat intelligence feeds for any emerging exploit activity and apply security advisories promptly. 7) Educate IT staff about this vulnerability to ensure rapid response and incident handling. These steps go beyond generic advice by focusing on network segmentation, access restriction, and proactive monitoring tailored to the specific vulnerability vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:04:25.675Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff6796ba6dffc5e2f5779f

Added to database: 10/27/2025, 12:37:42 PM

Last enriched: 10/27/2025, 12:52:48 PM

Last updated: 10/27/2025, 1:58:06 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats