A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://github.com/QIU-DIE/CVE/issues/22 | Exploit Third Party Advisory Issue Tracking |
| https://vuldb.com/?ctiid.329945 | Permissions Required VDB Entry |
| https://vuldb.com/?id.329945 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.674161 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
| https://github.com/QIU-DIE/CVE/issues/22 | Exploit Third Party Advisory Issue Tracking |
Configurations
Configuration 1 (hide)
| AND |
|
History
28 Oct 2025, 02:07
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:* cpe:2.3:h:tenda:ch22:*:*:*:*:*:*:*:* |
|
| First Time |
Tenda ch22
Tenda Tenda ch22 Firmware |
|
| References | () https://github.com/QIU-DIE/CVE/issues/22 - Exploit, Third Party Advisory, Issue Tracking | |
| References | () https://vuldb.com/?ctiid.329945 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.329945 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.674161 - Third Party Advisory, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product |
27 Oct 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-27 13:15
Updated : 2025-10-28 02:07
NVD link : CVE-2025-12273
Mitre link : CVE-2025-12273
CVE.ORG link : CVE-2025-12273
JSON object : View
Products Affected
tenda
- ch22_firmware
- ch22
