Metrics
Affected Vendors & Products
Tue, 28 Oct 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ch22 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ch22:*:*:*:*:*:*:*:* cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ch22 Firmware
|
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ch22 |
|
| Vendors & Products |
Tenda
Tenda ch22 |
Mon, 27 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. | |
| Title | Tenda CH22 webExcptypemanFilter fromwebExcptypemanFilter buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-10-27T12:32:08.278Z
Updated: 2025-10-27T13:07:43.656Z
Reserved: 2025-10-26T16:04:22.594Z
Link: CVE-2025-12273
Updated: 2025-10-27T13:07:17.087Z
Status : Analyzed
Published: 2025-10-27T13:15:43.183
Modified: 2025-10-28T02:07:59.857
Link: CVE-2025-12273
No data.