Vulnerability Description
A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ch22 Firmware | 1.0.0.1 |
| Tenda | Ch22 | All versions |
Related Weaknesses (CWE)
References
- https://github.com/QIU-DIE/CVE/issues/22ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.329945Permissions RequiredVDB Entry
- https://vuldb.com/?id.329945Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.674161Third Party AdvisoryVDB Entry
- https://www.tenda.com.cn/Product
- https://github.com/QIU-DIE/CVE/issues/22ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2025-12273?
CVE-2025-12273 is a vulnerability with a CVSS score of 8.8 (HIGH). A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead...
How severe is CVE-2025-12273?
CVE-2025-12273 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-12273?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ch22 Firmware, Tenda Ch22.