Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12322: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-12322cvecve-2025-12322
Published: Mon Oct 27 2025 (10/27/2025, 20:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. Executing manipulation of the argument page can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 11/04/2025, 03:20:50 UTC

Technical Analysis

CVE-2025-12322 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the fromNatStaticSetting function, specifically in the handling of the 'page' argument within the /goform/NatStaticSetting endpoint. Improper validation or sanitization of this input allows an attacker to overflow a buffer, potentially overwriting adjacent memory. This flaw can be exploited remotely over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability, with high potential for remote code execution or denial of service. The CVSS score of 8.7 (high) reflects the ease of exploitation and the severe consequences. Although no active exploitation has been reported, a public exploit is available, increasing the likelihood of attacks. The vulnerability affects only version 1.0.0.1 of the Tenda CH22 firmware. No official patch links are currently provided, which suggests that users must rely on vendor advisories or implement network-level mitigations. The vulnerability is critical for environments where Tenda CH22 devices are deployed, especially in enterprise or ISP networks, as compromise could lead to network disruption or further lateral attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Exploitation could allow attackers to execute arbitrary code on affected routers, potentially gaining control over network traffic, intercepting sensitive data, or launching further attacks within the internal network. The availability of a public exploit increases the risk of widespread attacks, including ransomware or espionage campaigns. Organizations relying on Tenda CH22 devices for critical infrastructure or internet connectivity could face service outages or data breaches. The lack of authentication for exploitation means attackers can target devices exposed to the internet or accessible within internal networks. This could impact sectors such as telecommunications, government, finance, and critical infrastructure providers across Europe. The absence of a vendor patch at the time of disclosure further exacerbates the risk, requiring immediate compensating controls to prevent exploitation.

Mitigation Recommendations

1. Immediately isolate or restrict network access to Tenda CH22 devices, especially blocking access to the /goform/NatStaticSetting endpoint from untrusted networks. 2. Implement firewall rules or intrusion prevention systems (IPS) to detect and block attempts to exploit the buffer overflow, focusing on malformed requests targeting the 'page' parameter. 3. Monitor network traffic for unusual activity or signs of exploitation attempts related to this vulnerability. 4. Contact Tenda support or check official channels regularly for firmware updates or patches addressing CVE-2025-12322 and apply them promptly once available. 5. If patching is not immediately possible, consider replacing vulnerable devices with alternative hardware from vendors with timely security support. 6. Conduct internal audits to identify all Tenda CH22 devices in the network and assess exposure. 7. Educate network administrators about the vulnerability and ensure incident response plans include this threat scenario. 8. Employ network segmentation to limit the impact of potential compromise of vulnerable devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T09:22:49.144Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffdbe2ba6dffc5e20d7f26

Added to database: 10/27/2025, 8:53:54 PM

Last enriched: 11/4/2025, 3:20:50 AM

Last updated: 12/9/2025, 3:47:36 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats