Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15076: Path Traversal in Tenda CH22

0
Medium
VulnerabilityCVE-2025-15076cvecve-2025-15076
Published: Thu Dec 25 2025 (12/25/2025, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown function of the file /public/. Executing a manipulation can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:29:24 UTC

Technical Analysis

CVE-2025-15076 is a path traversal vulnerability affecting the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in an unspecified function related to the /public/ directory, where improper input validation allows an attacker to manipulate file paths. By exploiting this flaw, a remote attacker can traverse directories outside the intended scope, potentially accessing sensitive files or configuration data stored on the device. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS 4.0 vector indicates no privileges or user interaction are needed, with partial impacts on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild, the public availability of exploit code increases the likelihood of attacks. The vulnerability does not currently have an official patch or vendor advisory, which leaves devices exposed. The Tenda CH22 is a consumer-grade router commonly used in residential and small office environments, which may increase the attack surface due to potentially weaker network defenses. The path traversal can lead to unauthorized disclosure of sensitive information or further compromise if combined with other vulnerabilities.

Potential Impact

The primary impact of CVE-2025-15076 is unauthorized access to files on the affected Tenda CH22 device, which can lead to disclosure of sensitive information such as configuration files, credentials, or logs. This can facilitate further attacks, including device takeover or lateral movement within a network. For organizations, this vulnerability could result in compromised network security, data breaches, and disruption of services if attackers leverage the flaw to alter device behavior or firmware. Since the exploit requires no authentication and can be executed remotely, any exposed Tenda CH22 device connected to the internet or accessible internal networks is at risk. The lack of patches increases the window of exposure, and the public availability of exploit code may lead to automated scanning and exploitation campaigns. Small businesses and home users relying on these devices may be particularly vulnerable due to limited security monitoring and patch management capabilities.

Mitigation Recommendations

1. Immediately restrict access to the Tenda CH22 management interface by implementing network segmentation and firewall rules to limit exposure to trusted networks only. 2. Disable remote management features if not required to reduce the attack surface. 3. Monitor network traffic and device logs for unusual file access patterns or unauthorized requests targeting the /public/ directory. 4. If possible, replace affected devices with models from vendors that provide timely security updates and have a strong security track record. 5. Regularly check for vendor advisories or firmware updates addressing this vulnerability and apply patches promptly once available. 6. Employ intrusion detection/prevention systems (IDS/IPS) that can detect path traversal attempts and block malicious requests. 7. Educate users and administrators about the risks of exposing device management interfaces to the internet and best practices for secure configuration.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-24T16:54:32.752Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694cb5998e23ad4a677a863f

Added to database: 12/25/2025, 3:55:05 AM

Last enriched: 2/24/2026, 10:29:24 PM

Last updated: 3/25/2026, 10:57:15 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses