CVE-2025-9813

A vulnerability was identified in Tenda CH22 1.0.0.1. This issue affects the function formSetSambaConf of the file /goform/SetSambaConf. The manipulation of the argument samba_userNameSda leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
References
Link Resource
https://github.com/csgii/cve/issues/2 Broken Link
https://vuldb.com/?ctiid.322140 Permissions Required
https://vuldb.com/?id.322140 Third Party Advisory VDB Entry
https://vuldb.com/?submit.641151 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*

History

04 Sep 2025, 17:48

Type Values Removed Values Added
References () https://github.com/csgii/cve/issues/2 - () https://github.com/csgii/cve/issues/2 - Broken Link
References () https://vuldb.com/?ctiid.322140 - () https://vuldb.com/?ctiid.322140 - Permissions Required
References () https://vuldb.com/?id.322140 - () https://vuldb.com/?id.322140 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.641151 - () https://vuldb.com/?submit.641151 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
First Time Tenda ch22
Tenda
Tenda ch22 Firmware
CPE cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*

02 Sep 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-02 05:15

Updated : 2025-09-04 17:48


NVD link : CVE-2025-9813

Mitre link : CVE-2025-9813

CVE.ORG link : CVE-2025-9813


JSON object : View

Products Affected

tenda

  • ch22_firmware
  • ch22
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')