ID

VAR-202510-0243


CVE

CVE-2025-11423


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  ch22  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-016234

DESCRIPTION

A vulnerability was found in Tenda CH22 1.0.0.1. This affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. Performing manipulation of the argument page results in memory corruption. The attack is possible to be carried out remotely. The exploit has been made public and could be used. of ch22 A buffer error vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability stems from the failure of the formSafeEmailFilter function in the file /goform/SafeEmailFilter to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-11423 // JVNDB: JVNDB-2025-016234 // CNVD: CNVD-2025-24477

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-24477

AFFECTED PRODUCTS

vendor:tendamodel:ch22scope:eqversion:1.0.0.1

Trust: 1.6

vendor:tendamodel:ch22scope:eqversion:ch22 firmware 1.0.0.1

Trust: 0.8

vendor:tendamodel:ch22scope: - version: -

Trust: 0.8

vendor:tendamodel:ch22scope:eqversion: -

Trust: 0.8

sources: CNVD: CNVD-2025-24477 // JVNDB: JVNDB-2025-016234 // NVD: CVE-2025-11423

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-11423
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-016234
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-24477
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-11423
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-016234
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-24477
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-11423
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-016234
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-24477 // JVNDB: JVNDB-2025-016234 // NVD: CVE-2025-11423

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-016234 // NVD: CVE-2025-11423

EXTERNAL IDS

db:NVDid:CVE-2025-11423

Trust: 3.2

db:VULDBid:327358

Trust: 1.8

db:JVNDBid:JVNDB-2025-016234

Trust: 0.8

db:CNVDid:CNVD-2025-24477

Trust: 0.6

sources: CNVD: CNVD-2025-24477 // JVNDB: JVNDB-2025-016234 // NVD: CVE-2025-11423

REFERENCES

url:https://github.com/f000x0/cve/issues/7

Trust: 2.4

url:https://vuldb.com/?id.327358

Trust: 1.8

url:https://vuldb.com/?submit.666009

Trust: 1.8

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://vuldb.com/?ctiid.327358

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-11423

Trust: 0.8

sources: CNVD: CNVD-2025-24477 // JVNDB: JVNDB-2025-016234 // NVD: CVE-2025-11423

SOURCES

db:CNVDid:CNVD-2025-24477
db:JVNDBid:JVNDB-2025-016234
db:NVDid:CVE-2025-11423

LAST UPDATE DATE

2025-11-22T23:12:01.470000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-24477date:2025-10-22T00:00:00
db:JVNDBid:JVNDB-2025-016234date:2025-10-17T01:33:00
db:NVDid:CVE-2025-11423date:2025-10-14T20:16:14.280

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-24477date:2025-10-21T00:00:00
db:JVNDBid:JVNDB-2025-016234date:2025-10-17T00:00:00
db:NVDid:CVE-2025-11423date:2025-10-08T02:15:41.497