CVE-2025-12274

A security vulnerability has been detected in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
References
Link Resource
https://github.com/QIU-DIE/CVE/issues/23 Exploit Issue Tracking
https://vuldb.com/?ctiid.329946 Permissions Required VDB Entry
https://vuldb.com/?id.329946 Third Party Advisory VDB Entry
https://vuldb.com/?submit.674165 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
https://github.com/QIU-DIE/CVE/issues/23 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*

History

28 Oct 2025, 02:06

Type Values Removed Values Added
CPE cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*
References () https://github.com/QIU-DIE/CVE/issues/23 - () https://github.com/QIU-DIE/CVE/issues/23 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.329946 - () https://vuldb.com/?ctiid.329946 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.329946 - () https://vuldb.com/?id.329946 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.674165 - () https://vuldb.com/?submit.674165 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
First Time Tenda ch22
Tenda
Tenda ch22 Firmware

27 Oct 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-27 13:15

Updated : 2025-10-28 02:06


NVD link : CVE-2025-12274

Mitre link : CVE-2025-12274

CVE.ORG link : CVE-2025-12274


JSON object : View

Products Affected

tenda

  • ch22_firmware
  • ch22
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')