ID

VAR-202510-2324


CVE

CVE-2025-12234


TITLE

Tenda CH22 fromSafeMacFilter function buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-27442

DESCRIPTION

A vulnerability has been found in Tenda CH22 1.0.0.1. This affects the function fromSafeMacFilter of the file /goform/SafeMacFilter. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `page` parameter of the `fromSafeMacFilter` function in the `/goform/SafeMacFilter` file fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack

Trust: 1.44

sources: NVD: CVE-2025-12234 // CNVD: CNVD-2025-27442

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-27442

AFFECTED PRODUCTS

vendor:tendamodel:ch22scope:eqversion:1.0.0.1

Trust: 1.6

sources: CNVD: CNVD-2025-27442 // NVD: CVE-2025-12234

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-12234
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-12234
value: HIGH

Trust: 1.0

CNVD: CNVD-2025-27442
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-12234
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-27442
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-12234
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: CNVD: CNVD-2025-27442 // NVD: CVE-2025-12234 // NVD: CVE-2025-12234

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

sources: NVD: CVE-2025-12234

PATCH

title:Patch for Tenda CH22 fromSafeMacFilter function buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/748321

Trust: 0.6

sources: CNVD: CNVD-2025-27442

EXTERNAL IDS

db:NVDid:CVE-2025-12234

Trust: 1.6

db:VULDBid:329904

Trust: 1.0

db:CNVDid:CNVD-2025-27442

Trust: 0.6

sources: CNVD: CNVD-2025-27442 // NVD: CVE-2025-12234

REFERENCES

url:https://www.tenda.com.cn/

Trust: 1.0

url:https://vuldb.com/?id.329904

Trust: 1.0

url:https://github.com/qiu-die/cve/issues/15

Trust: 1.0

url:https://vuldb.com/?submit.673718

Trust: 1.0

url:https://vuldb.com/?ctiid.329904

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-12234

Trust: 0.6

sources: CNVD: CNVD-2025-27442 // NVD: CVE-2025-12234

SOURCES

db:CNVDid:CNVD-2025-27442
db:NVDid:CVE-2025-12234

LAST UPDATE DATE

2025-11-19T23:30:51.010000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-27442date:2025-11-10T00:00:00
db:NVDid:CVE-2025-12234date:2025-10-27T18:47:15.660

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-27442date:2025-10-31T00:00:00
db:NVDid:CVE-2025-12234date:2025-10-27T07:15:38.350