CVE-2025-13400: Buffer Overflow in Tenda CH22
A vulnerability was detected in Tenda CH22 1.0.0.1. Affected is the function formWrlExtraGet of the file /goform/WrlExtraGet. Performing manipulation of the argument chkHz results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-13400 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the formWrlExtraGet function, which processes requests to the /goform/WrlExtraGet endpoint. Specifically, the chkHz argument is improperly handled, allowing an attacker to craft a malicious request that causes a buffer overflow. This overflow can overwrite memory, potentially enabling remote code execution or causing the device to crash, leading to denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no active exploitation in the wild has been reported, the availability of public exploit code increases the likelihood of future attacks. The lack of an official patch at the time of publication necessitates immediate mitigation efforts by network administrators. This vulnerability affects only version 1.0.0.1 of the Tenda CH22 firmware, so organizations should verify their device versions and apply updates once available. The exploit targets a common router function, which may be exposed to the internet or internal networks, increasing the attack surface. Given the critical role of routers in network infrastructure, successful exploitation could lead to network compromise, data interception, or service disruption.
Potential Impact
For European organizations, exploitation of CVE-2025-13400 could result in severe consequences including unauthorized remote code execution on network routers, leading to full compromise of network traffic confidentiality and integrity. Attackers could intercept, modify, or redirect sensitive communications, impacting data privacy compliance such as GDPR. The availability of network services could be disrupted by denial of service conditions caused by the overflow, affecting business continuity. Organizations relying on Tenda CH22 devices in critical infrastructure, small to medium enterprises, or branch offices may face elevated risks due to potentially weaker network segmentation and monitoring. The remote and unauthenticated nature of the exploit increases the attack surface, especially for devices exposed to the internet or poorly secured internal networks. The public availability of exploit code further raises the risk of automated scanning and exploitation campaigns targeting European networks. This could lead to lateral movement within corporate networks or serve as a foothold for broader attacks. The impact is particularly significant for sectors with stringent security requirements such as finance, healthcare, and government institutions. Failure to mitigate this vulnerability promptly could result in regulatory penalties, reputational damage, and operational disruptions.
Mitigation Recommendations
1. Immediate inventory and identification of all Tenda CH22 devices running firmware version 1.0.0.1 within the network. 2. Monitor Tenda’s official channels for firmware updates addressing CVE-2025-13400 and apply patches as soon as they become available. 3. Until patches are released, implement network-level protections such as firewall rules to block or restrict access to the /goform/WrlExtraGet endpoint, especially from untrusted networks or the internet. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploit attempts targeting this vulnerability. 5. Segment networks to isolate vulnerable devices from critical assets and limit lateral movement in case of compromise. 6. Conduct regular vulnerability scanning and penetration testing to identify exposed Tenda CH22 devices and verify mitigation effectiveness. 7. Educate network administrators about the vulnerability and the importance of monitoring logs for suspicious activity related to the chkHz parameter. 8. Consider replacing outdated or unsupported Tenda CH22 devices with more secure alternatives if patching is delayed or unavailable. 9. Implement strict access controls and network hardening best practices to reduce exposure of management interfaces. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands
CVE-2025-13400: Buffer Overflow in Tenda CH22
Description
A vulnerability was detected in Tenda CH22 1.0.0.1. Affected is the function formWrlExtraGet of the file /goform/WrlExtraGet. Performing manipulation of the argument chkHz results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13400 is a buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in the formWrlExtraGet function, which processes requests to the /goform/WrlExtraGet endpoint. Specifically, the chkHz argument is improperly handled, allowing an attacker to craft a malicious request that causes a buffer overflow. This overflow can overwrite memory, potentially enabling remote code execution or causing the device to crash, leading to denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no active exploitation in the wild has been reported, the availability of public exploit code increases the likelihood of future attacks. The lack of an official patch at the time of publication necessitates immediate mitigation efforts by network administrators. This vulnerability affects only version 1.0.0.1 of the Tenda CH22 firmware, so organizations should verify their device versions and apply updates once available. The exploit targets a common router function, which may be exposed to the internet or internal networks, increasing the attack surface. Given the critical role of routers in network infrastructure, successful exploitation could lead to network compromise, data interception, or service disruption.
Potential Impact
For European organizations, exploitation of CVE-2025-13400 could result in severe consequences including unauthorized remote code execution on network routers, leading to full compromise of network traffic confidentiality and integrity. Attackers could intercept, modify, or redirect sensitive communications, impacting data privacy compliance such as GDPR. The availability of network services could be disrupted by denial of service conditions caused by the overflow, affecting business continuity. Organizations relying on Tenda CH22 devices in critical infrastructure, small to medium enterprises, or branch offices may face elevated risks due to potentially weaker network segmentation and monitoring. The remote and unauthenticated nature of the exploit increases the attack surface, especially for devices exposed to the internet or poorly secured internal networks. The public availability of exploit code further raises the risk of automated scanning and exploitation campaigns targeting European networks. This could lead to lateral movement within corporate networks or serve as a foothold for broader attacks. The impact is particularly significant for sectors with stringent security requirements such as finance, healthcare, and government institutions. Failure to mitigate this vulnerability promptly could result in regulatory penalties, reputational damage, and operational disruptions.
Mitigation Recommendations
1. Immediate inventory and identification of all Tenda CH22 devices running firmware version 1.0.0.1 within the network. 2. Monitor Tenda’s official channels for firmware updates addressing CVE-2025-13400 and apply patches as soon as they become available. 3. Until patches are released, implement network-level protections such as firewall rules to block or restrict access to the /goform/WrlExtraGet endpoint, especially from untrusted networks or the internet. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploit attempts targeting this vulnerability. 5. Segment networks to isolate vulnerable devices from critical assets and limit lateral movement in case of compromise. 6. Conduct regular vulnerability scanning and penetration testing to identify exposed Tenda CH22 devices and verify mitigation effectiveness. 7. Educate network administrators about the vulnerability and the importance of monitoring logs for suspicious activity related to the chkHz parameter. 8. Consider replacing outdated or unsupported Tenda CH22 devices with more secure alternatives if patching is delayed or unavailable. 9. Implement strict access controls and network hardening best practices to reduce exposure of management interfaces. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T10:29:17.859Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691dfb7693c808727dc0437d
Added to database: 11/19/2025, 5:16:38 PM
Last enriched: 11/19/2025, 5:23:35 PM
Last updated: 11/19/2025, 6:47:09 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63211: n/a
HighCVE-2025-65089: CWE-862: Missing Authorization in xwikisas xwiki-pro-macros
MediumCVE-2025-13315: CWE-420: Unprotected Alternate Channel in Lynxtechnology Twonky Server
CriticalCVE-2025-13316: CWE-321: Use of Hard-coded Cryptographic Key in Lynxtechnology Twonky Server
HighCVE-2025-65034: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.