ID

VAR-202510-2333


CVE

CVE-2025-12265


TITLE

Tenda CH22 fromVirtualSer function buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-27235

DESCRIPTION

A weakness has been identified in Tenda CH22 1.0.0.1. Affected by this issue is the function fromVirtualSer of the file /goform/VirtualSer. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `page` parameter of the function `fromVirtualSer` in the file `/goform/VirtualSer` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack

Trust: 1.44

sources: NVD: CVE-2025-12265 // CNVD: CNVD-2025-27235

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-27235

AFFECTED PRODUCTS

vendor:tendamodel:ch22scope:eqversion:1.0.0.1

Trust: 1.6

sources: CNVD: CNVD-2025-27235 // NVD: CVE-2025-12265

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-12265
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-12265
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2025-27235
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-12265
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-27235
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-12265
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-12265
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-27235 // NVD: CVE-2025-12265 // NVD: CVE-2025-12265

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

sources: NVD: CVE-2025-12265

PATCH

title:Patch for Tenda CH22 fromVirtualSer function buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/749121

Trust: 0.6

sources: CNVD: CNVD-2025-27235

EXTERNAL IDS

db:NVDid:CVE-2025-12265

Trust: 1.6

db:VULDBid:329936

Trust: 1.0

db:CNVDid:CNVD-2025-27235

Trust: 0.6

sources: CNVD: CNVD-2025-27235 // NVD: CVE-2025-12265

REFERENCES

url:https://vuldb.com/?id.329936

Trust: 1.0

url:https://github.com/qiu-die/cve/issues/18

Trust: 1.0

url:https://vuldb.com/?ctiid.329936

Trust: 1.0

url:https://vuldb.com/?submit.674012

Trust: 1.0

url:https://www.tenda.com.cn/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-12265

Trust: 0.6

sources: CNVD: CNVD-2025-27235 // NVD: CVE-2025-12265

SOURCES

db:CNVDid:CNVD-2025-27235
db:NVDid:CVE-2025-12265

LAST UPDATE DATE

2025-11-19T23:22:56.493000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-27235date:2025-11-07T00:00:00
db:NVDid:CVE-2025-12265date:2025-10-28T02:08:44.137

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-27235date:2025-11-05T00:00:00
db:NVDid:CVE-2025-12265date:2025-10-27T11:15:40.050