A vulnerability was found in Tenda CH22 1.0.0.1. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page results in buffer overflow. The attack must originate from the local network. The exploit has been made public and could be used.
History

Mon, 27 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ch22
Tenda ch22 Firmware
CPEs cpe:2.3:h:tenda:ch22:*:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ch22
Tenda ch22 Firmware

Mon, 27 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 06:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda CH22 1.0.0.1. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page results in buffer overflow. The attack must originate from the local network. The exploit has been made public and could be used.
Title Tenda CH22 SetIpBind fromSetIpBind buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 7.7, 'vector': 'AV:A/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-10-27T06:22:44.013Z

Updated: 2025-10-27T13:25:16.489Z

Reserved: 2025-10-25T17:03:56.836Z

Link: CVE-2025-12235

cve-icon Vulnrichment

Updated: 2025-10-27T13:24:59.526Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-27T07:15:38.533

Modified: 2025-10-27T18:45:58.327

Link: CVE-2025-12235

cve-icon Redhat

No data.