CVE-2025-15076: Path Traversal in Tenda CH22
CVE-2025-15076 is a path traversal vulnerability in Tenda CH22 version 1. 0. 0. 1 that allows remote attackers to manipulate file paths via an unknown function related to the /public/ directory. This vulnerability requires no authentication or user interaction and can lead to partial compromise of confidentiality, integrity, and availability. The CVSS 4. 0 score is 6. 9 (medium severity), reflecting the ease of exploitation and potential impact. Although no public exploits are currently known in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. European organizations using Tenda CH22 devices should prioritize mitigation to prevent unauthorized access to sensitive files.
AI Analysis
Technical Summary
CVE-2025-15076 identifies a path traversal vulnerability in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability arises from insufficient validation of user-supplied input in an unspecified function related to the /public/ directory, allowing an attacker to traverse directories and access files outside the intended directory scope. This can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The path traversal flaw can lead to unauthorized disclosure of sensitive files, potential modification of configuration files, or disruption of device functionality, impacting confidentiality, integrity, and availability. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild, public availability of exploit code increases the likelihood of attacks. The lack of a patch or official mitigation guidance from Tenda at this time necessitates immediate defensive measures by users. Given the device’s role in network infrastructure, exploitation could facilitate lateral movement or data exfiltration within affected networks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily due to the widespread use of Tenda networking devices in small to medium enterprises and residential environments. Exploitation could lead to unauthorized access to sensitive configuration files or user data stored on the device, potentially enabling attackers to pivot into internal networks or disrupt network availability. Critical sectors such as telecommunications, manufacturing, and public administration that rely on Tenda CH22 for network connectivity may face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit increases the attack surface, especially for organizations with exposed management interfaces or insufficient network segmentation. While the impact is medium severity, the presence of public exploit code elevates the urgency for mitigation to prevent exploitation attempts that could lead to broader compromise or espionage activities targeting European entities.
Mitigation Recommendations
1. Immediately isolate Tenda CH22 devices from direct internet exposure by placing them behind firewalls or VPNs to restrict remote access. 2. Disable any unnecessary services or interfaces, particularly those exposing the /public/ directory or management portals. 3. Implement strict network segmentation to limit lateral movement if a device is compromised. 4. Monitor network traffic and device logs for unusual access patterns or attempts to exploit path traversal. 5. Regularly audit device configurations and firmware versions to identify vulnerable units. 6. Engage with Tenda support channels to obtain any forthcoming patches or official mitigation advice. 7. Where possible, replace vulnerable devices with updated models or alternative vendors that have addressed this vulnerability. 8. Educate IT staff on the risks of path traversal vulnerabilities and ensure incident response plans include scenarios involving network device compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-15076: Path Traversal in Tenda CH22
Description
CVE-2025-15076 is a path traversal vulnerability in Tenda CH22 version 1. 0. 0. 1 that allows remote attackers to manipulate file paths via an unknown function related to the /public/ directory. This vulnerability requires no authentication or user interaction and can lead to partial compromise of confidentiality, integrity, and availability. The CVSS 4. 0 score is 6. 9 (medium severity), reflecting the ease of exploitation and potential impact. Although no public exploits are currently known in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. European organizations using Tenda CH22 devices should prioritize mitigation to prevent unauthorized access to sensitive files.
AI-Powered Analysis
Technical Analysis
CVE-2025-15076 identifies a path traversal vulnerability in the Tenda CH22 router firmware version 1.0.0.1. The vulnerability arises from insufficient validation of user-supplied input in an unspecified function related to the /public/ directory, allowing an attacker to traverse directories and access files outside the intended directory scope. This can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The path traversal flaw can lead to unauthorized disclosure of sensitive files, potential modification of configuration files, or disruption of device functionality, impacting confidentiality, integrity, and availability. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild, public availability of exploit code increases the likelihood of attacks. The lack of a patch or official mitigation guidance from Tenda at this time necessitates immediate defensive measures by users. Given the device’s role in network infrastructure, exploitation could facilitate lateral movement or data exfiltration within affected networks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily due to the widespread use of Tenda networking devices in small to medium enterprises and residential environments. Exploitation could lead to unauthorized access to sensitive configuration files or user data stored on the device, potentially enabling attackers to pivot into internal networks or disrupt network availability. Critical sectors such as telecommunications, manufacturing, and public administration that rely on Tenda CH22 for network connectivity may face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit increases the attack surface, especially for organizations with exposed management interfaces or insufficient network segmentation. While the impact is medium severity, the presence of public exploit code elevates the urgency for mitigation to prevent exploitation attempts that could lead to broader compromise or espionage activities targeting European entities.
Mitigation Recommendations
1. Immediately isolate Tenda CH22 devices from direct internet exposure by placing them behind firewalls or VPNs to restrict remote access. 2. Disable any unnecessary services or interfaces, particularly those exposing the /public/ directory or management portals. 3. Implement strict network segmentation to limit lateral movement if a device is compromised. 4. Monitor network traffic and device logs for unusual access patterns or attempts to exploit path traversal. 5. Regularly audit device configurations and firmware versions to identify vulnerable units. 6. Engage with Tenda support channels to obtain any forthcoming patches or official mitigation advice. 7. Where possible, replace vulnerable devices with updated models or alternative vendors that have addressed this vulnerability. 8. Educate IT staff on the risks of path traversal vulnerabilities and ensure incident response plans include scenarios involving network device compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-24T16:54:32.752Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694cb5998e23ad4a677a863f
Added to database: 12/25/2025, 3:55:05 AM
Last enriched: 1/1/2026, 10:38:04 PM
Last updated: 2/6/2026, 2:02:12 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.