Home

Description

EN DE

A weakness has been identified in Tenda CH22 1.0.0.1. Affected by this issue is the function fromVirtualSer of the file /goform/VirtualSer. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.

Eine Schwachstelle wurde in Tenda CH22 1.0.0.1 gefunden. Hierbei geht es um die Funktion fromVirtualSer der Datei /goform/VirtualSer. Die Veränderung des Parameters page resultiert in buffer overflow. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden.

PUBLISHED Reserved 2025-10-26 | Published 2025-10-27 | Updated 2025-10-27 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Buffer Overflow

Memory Corruption

Product status

1.0.0.1
affected

Timeline

2025-10-26:Advisory disclosed
2025-10-26:VulDB entry created
2025-10-26:VulDB entry last update

Credits

hhsw34 (VulDB User) reporter

References

vuldb.com/?id.329936 (VDB-329936 | Tenda CH22 VirtualSer fromVirtualSer buffer overflow) vdb-entry technical-description

vuldb.com/?ctiid.329936 (VDB-329936 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.674012 (Submit #674012 | Tenda CH22 V1.0.0.1 Buffer Overflow) third-party-advisory

github.com/QIU-DIE/CVE/issues/18 exploit issue-tracking

www.tenda.com.cn/ product

cve.org (CVE-2025-12265)

nvd.nist.gov (CVE-2025-12265)

Download JSON