ID

VAR-202510-2277


CVE

CVE-2025-12273


TITLE

Tenda CH22 formwebExcptypemanFilter function buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-27116

DESCRIPTION

A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. Version 1.0.0.1 of the Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `page` in the file `/goform/webExcptypemanFilter` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack

Trust: 1.44

sources: NVD: CVE-2025-12273 // CNVD: CNVD-2025-27116

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-27116

AFFECTED PRODUCTS

vendor:tendamodel:ch22scope:eqversion:1.0.0.1

Trust: 1.6

sources: CNVD: CNVD-2025-27116 // NVD: CVE-2025-12273

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-12273
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-12273
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2025-27116
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-12273
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-27116
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-12273
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-12273
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-27116 // NVD: CVE-2025-12273 // NVD: CVE-2025-12273

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

sources: NVD: CVE-2025-12273

PATCH

title:Patch for Tenda CH22 formwebExcptypemanFilter function buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/748301

Trust: 0.6

sources: CNVD: CNVD-2025-27116

EXTERNAL IDS

db:NVDid:CVE-2025-12273

Trust: 1.6

db:VULDBid:329945

Trust: 1.0

db:CNVDid:CNVD-2025-27116

Trust: 0.6

sources: CNVD: CNVD-2025-27116 // NVD: CVE-2025-12273

REFERENCES

url:https://github.com/qiu-die/cve/issues/22

Trust: 1.6

url:https://vuldb.com/?ctiid.329945

Trust: 1.0

url:https://vuldb.com/?id.329945

Trust: 1.0

url:https://vuldb.com/?submit.674161

Trust: 1.0

url:https://www.tenda.com.cn/

Trust: 1.0

sources: CNVD: CNVD-2025-27116 // NVD: CVE-2025-12273

SOURCES

db:CNVDid:CNVD-2025-27116
db:NVDid:CVE-2025-12273

LAST UPDATE DATE

2025-11-19T23:24:22.606000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-27116date:2025-11-07T00:00:00
db:NVDid:CVE-2025-12273date:2025-10-28T02:07:59.857

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-27116date:2025-10-31T00:00:00
db:NVDid:CVE-2025-12273date:2025-10-27T13:15:43.183