A weakness has been identified in Tenda CH22 1.0.0.1. Affected by this issue is the function fromVirtualSer of the file /goform/VirtualSer. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
History

Tue, 28 Oct 2025 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22 Firmware
CPEs cpe:2.3:h:tenda:ch22:*:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
Vendors & Products Tenda ch22 Firmware

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ch22
Vendors & Products Tenda
Tenda ch22

Mon, 27 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 11:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda CH22 1.0.0.1. Affected by this issue is the function fromVirtualSer of the file /goform/VirtualSer. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
Title Tenda CH22 VirtualSer fromVirtualSer buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-10-27T11:02:07.933Z

Updated: 2025-10-27T12:14:52.668Z

Reserved: 2025-10-26T05:50:20.200Z

Link: CVE-2025-12265

cve-icon Vulnrichment

Updated: 2025-10-27T12:14:45.508Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-27T11:15:40.050

Modified: 2025-10-28T02:08:44.137

Link: CVE-2025-12265

cve-icon Redhat

No data.