Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13288: Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2025-13288cvecve-2025-13288
Published: Mon Nov 17 2025 (11/17/2025, 15:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A security vulnerability has been detected in Tenda CH22 1.0.0.1. This impacts the function fromPptpUserSetting of the file /goform/PPTPUserSetting. The manipulation of the argument delno leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 11/17/2025, 16:16:14 UTC

Technical Analysis

CVE-2025-13288 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The flaw exists in the function fromPptpUserSetting, specifically in the handling of the 'delno' parameter within the /goform/PPTPUserSetting HTTP endpoint. An attacker can remotely send a crafted request manipulating the 'delno' argument to overflow a buffer, potentially overwriting memory and enabling arbitrary code execution or causing a denial of service. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability and technical details increases the likelihood of exploitation attempts. The vulnerability affects only version 1.0.0.1 of the Tenda CH22 firmware, a device commonly used in small office and home office environments for VPN and broadband connectivity. The lack of available patches at the time of disclosure necessitates interim mitigations to prevent exploitation.

Potential Impact

The exploitation of CVE-2025-13288 can lead to full compromise of affected Tenda CH22 routers, allowing attackers to execute arbitrary code remotely. This can result in unauthorized access to network traffic, interception or manipulation of data, disruption of network services, and potential pivoting into internal networks. For European organizations, especially small and medium enterprises relying on Tenda CH22 devices for VPN or broadband connectivity, this vulnerability poses a significant risk to network security and business continuity. The compromise of these routers could lead to data breaches involving sensitive customer or corporate information, disruption of critical business operations, and potential regulatory non-compliance under GDPR due to inadequate protection of personal data. The ease of exploitation without authentication or user interaction further elevates the threat level, making automated attacks feasible. Additionally, the lack of patches at disclosure time increases exposure duration.

Mitigation Recommendations

1. Immediately restrict external network access to the /goform/PPTPUserSetting endpoint by implementing firewall rules or access control lists to block unsolicited inbound traffic targeting the router's management interfaces. 2. Disable PPTP VPN functionality on the Tenda CH22 device if not required, reducing the attack surface. 3. Monitor network traffic for anomalous requests to the vulnerable endpoint and unusual router behavior indicative of exploitation attempts. 4. Apply vendor-provided firmware updates or patches as soon as they become available to remediate the vulnerability. 5. If patching is delayed, consider isolating affected devices within segmented network zones with limited access to critical infrastructure. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting exploitation attempts of this vulnerability. 7. Educate network administrators about the vulnerability and ensure incident response plans include steps for compromised router scenarios. 8. Regularly audit and update router firmware and configurations to maintain security hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-17T07:48:52.469Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b46c7bf18c64a4b2b8198

Added to database: 11/17/2025, 4:01:11 PM

Last enriched: 11/17/2025, 4:16:14 PM

Last updated: 11/17/2025, 7:00:12 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats