A vulnerability was detected in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function fromSafeClientFilter of the file /goform/SafeClientFilter. Performing manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 28 Oct 2025 11:30:00 +0900

Type Values Removed Values Added
First Time appeared Tenda ch22 Firmware
CPEs cpe:2.3:h:tenda:ch22:*:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
Vendors & Products Tenda ch22 Firmware

Tue, 28 Oct 2025 07:30:00 +0900

Type Values Removed Values Added
First Time appeared Tenda
Tenda ch22
Vendors & Products Tenda
Tenda ch22

Tue, 28 Oct 2025 00:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 15:45:00 +0900

Type Values Removed Values Added
Description A vulnerability was detected in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function fromSafeClientFilter of the file /goform/SafeClientFilter. Performing manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Title Tenda CH22 SafeClientFilter fromSafeClientFilter buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-10-27T14:51:20.097Z

Reserved: 2025-10-25T17:03:47.322Z

Link: CVE-2025-12232

cve-icon Vulnrichment

Updated: 2025-10-27T14:50:51.150Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-27T07:15:37.900

Modified: 2025-10-28T02:17:03.930

Link: CVE-2025-12232

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-28T07:04:16Z

Weaknesses