Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15229: Denial of Service in Tenda CH22

0
Medium
VulnerabilityCVE-2025-15229cvecve-2025-15229
Published: Tue Dec 30 2025 (12/30/2025, 06:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A vulnerability has been found in Tenda CH22 up to 1.0.0.1. Affected by this vulnerability is the function fromDhcpListClient of the file /goform/DhcpListClient. Such manipulation of the argument LISTLEN leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:39:39 UTC

Technical Analysis

CVE-2025-15229 is a denial of service (DoS) vulnerability identified in the Tenda CH22 router models running firmware versions 1.0.0.0 and 1.0.0.1. The vulnerability resides in the fromDhcpListClient function, which processes DHCP client lists via the /goform/DhcpListClient endpoint. Specifically, the issue arises from improper handling of the LISTLEN argument, which can be manipulated by an attacker to cause the device to crash or become unresponsive, effectively denying service to legitimate users. The attack vector is remote and does not require any authentication or user interaction, increasing the attack surface significantly. The CVSS v4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation (network accessible, no privileges needed) and the impact limited to availability without affecting confidentiality or integrity. Although no exploits have been observed in the wild yet, the public disclosure of the exploit code means attackers could develop and deploy attacks rapidly. The vulnerability affects the router’s availability, which can disrupt network operations for home users or small businesses relying on these devices. The lack of an official patch at the time of disclosure necessitates interim mitigations to reduce exposure.

Potential Impact

The primary impact of CVE-2025-15229 is the denial of service of Tenda CH22 routers, which can lead to network outages and loss of connectivity for end users. This can disrupt business operations, especially for small enterprises or home offices relying on these routers for internet access. Since the vulnerability can be exploited remotely without authentication, attackers can launch DoS attacks from anywhere on the internet, potentially targeting multiple devices simultaneously to cause widespread disruption. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability may affect critical communications and services. In environments where Tenda CH22 routers are deployed as part of larger network infrastructures, this could lead to cascading failures or increased operational costs due to downtime and troubleshooting. The public availability of exploit details increases the likelihood of opportunistic attacks, particularly in regions where these devices are prevalent.

Mitigation Recommendations

1. Monitor Tenda’s official channels for firmware updates addressing CVE-2025-15229 and apply patches promptly once released. 2. Until patches are available, restrict access to the router’s management interfaces and the /goform/DhcpListClient endpoint by implementing network segmentation and firewall rules to block unauthorized inbound traffic. 3. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capable of identifying suspicious requests targeting DHCP client list parameters. 4. Disable remote management features on the router if not required, reducing exposure to external attackers. 5. Regularly audit network devices for unusual behavior or crashes that may indicate exploitation attempts. 6. For organizations, consider deploying alternative or backup network devices to maintain connectivity during potential outages. 7. Educate users about the risk and encourage reporting of connectivity issues promptly to enable rapid response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-29T07:50:15.313Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450abdb813ff03e2beb68

Added to database: 12/30/2025, 10:22:35 PM

Last enriched: 2/24/2026, 10:39:39 PM

Last updated: 3/25/2026, 12:13:10 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses