CVE-2025-15076: Path Traversal in Tenda CH22
A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown function of the file /public/. Executing a manipulation can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
AI Analysis
Technical Summary
CVE-2025-15076 is a path traversal vulnerability affecting the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in an unspecified function related to the /public/ directory, where improper input validation allows an attacker to manipulate file paths. By exploiting this flaw, a remote attacker can traverse directories outside the intended scope, potentially accessing sensitive files or configuration data stored on the device. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS 4.0 vector indicates no privileges or user interaction are needed, with partial impacts on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild, the public availability of exploit code increases the likelihood of attacks. The vulnerability does not currently have an official patch or vendor advisory, which leaves devices exposed. The Tenda CH22 is a consumer-grade router commonly used in residential and small office environments, which may increase the attack surface due to potentially weaker network defenses. The path traversal can lead to unauthorized disclosure of sensitive information or further compromise if combined with other vulnerabilities.
Potential Impact
The primary impact of CVE-2025-15076 is unauthorized access to files on the affected Tenda CH22 device, which can lead to disclosure of sensitive information such as configuration files, credentials, or logs. This can facilitate further attacks, including device takeover or lateral movement within a network. For organizations, this vulnerability could result in compromised network security, data breaches, and disruption of services if attackers leverage the flaw to alter device behavior or firmware. Since the exploit requires no authentication and can be executed remotely, any exposed Tenda CH22 device connected to the internet or accessible internal networks is at risk. The lack of patches increases the window of exposure, and the public availability of exploit code may lead to automated scanning and exploitation campaigns. Small businesses and home users relying on these devices may be particularly vulnerable due to limited security monitoring and patch management capabilities.
Mitigation Recommendations
1. Immediately restrict access to the Tenda CH22 management interface by implementing network segmentation and firewall rules to limit exposure to trusted networks only. 2. Disable remote management features if not required to reduce the attack surface. 3. Monitor network traffic and device logs for unusual file access patterns or unauthorized requests targeting the /public/ directory. 4. If possible, replace affected devices with models from vendors that provide timely security updates and have a strong security track record. 5. Regularly check for vendor advisories or firmware updates addressing this vulnerability and apply patches promptly once available. 6. Employ intrusion detection/prevention systems (IDS/IPS) that can detect path traversal attempts and block malicious requests. 7. Educate users and administrators about the risks of exposing device management interfaces to the internet and best practices for secure configuration.
Affected Countries
China, India, Indonesia, Vietnam, Russia, Brazil, United States, Germany, United Kingdom, France, Italy, Spain
CVE-2025-15076: Path Traversal in Tenda CH22
Description
A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown function of the file /public/. Executing a manipulation can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15076 is a path traversal vulnerability affecting the Tenda CH22 router firmware version 1.0.0.1. The vulnerability resides in an unspecified function related to the /public/ directory, where improper input validation allows an attacker to manipulate file paths. By exploiting this flaw, a remote attacker can traverse directories outside the intended scope, potentially accessing sensitive files or configuration data stored on the device. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS 4.0 vector indicates no privileges or user interaction are needed, with partial impacts on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild, the public availability of exploit code increases the likelihood of attacks. The vulnerability does not currently have an official patch or vendor advisory, which leaves devices exposed. The Tenda CH22 is a consumer-grade router commonly used in residential and small office environments, which may increase the attack surface due to potentially weaker network defenses. The path traversal can lead to unauthorized disclosure of sensitive information or further compromise if combined with other vulnerabilities.
Potential Impact
The primary impact of CVE-2025-15076 is unauthorized access to files on the affected Tenda CH22 device, which can lead to disclosure of sensitive information such as configuration files, credentials, or logs. This can facilitate further attacks, including device takeover or lateral movement within a network. For organizations, this vulnerability could result in compromised network security, data breaches, and disruption of services if attackers leverage the flaw to alter device behavior or firmware. Since the exploit requires no authentication and can be executed remotely, any exposed Tenda CH22 device connected to the internet or accessible internal networks is at risk. The lack of patches increases the window of exposure, and the public availability of exploit code may lead to automated scanning and exploitation campaigns. Small businesses and home users relying on these devices may be particularly vulnerable due to limited security monitoring and patch management capabilities.
Mitigation Recommendations
1. Immediately restrict access to the Tenda CH22 management interface by implementing network segmentation and firewall rules to limit exposure to trusted networks only. 2. Disable remote management features if not required to reduce the attack surface. 3. Monitor network traffic and device logs for unusual file access patterns or unauthorized requests targeting the /public/ directory. 4. If possible, replace affected devices with models from vendors that provide timely security updates and have a strong security track record. 5. Regularly check for vendor advisories or firmware updates addressing this vulnerability and apply patches promptly once available. 6. Employ intrusion detection/prevention systems (IDS/IPS) that can detect path traversal attempts and block malicious requests. 7. Educate users and administrators about the risks of exposing device management interfaces to the internet and best practices for secure configuration.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-24T16:54:32.752Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694cb5998e23ad4a677a863f
Added to database: 12/25/2025, 3:55:05 AM
Last enriched: 2/24/2026, 10:29:24 PM
Last updated: 3/25/2026, 10:57:15 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.