CVE Alert: CVE-2025-12322 – Tenda – CH22

CVE-2025-12322

HIGHNo exploitation known

A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. Executing manipulation of the argument page can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

CVSS v3.1 (8.8)
Vendor
Tenda
Product
CH22
Versions
1.0.0.1
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-27T20:32:09.364Z
Updated
2025-10-27T20:32:09.364Z

AI Summary Analysis

**Risk verdict** High risk: remote, publicly disclosed exploit enables code execution with no user interaction; exploitation is actively publishable and poses immediate danger.

**Why this matters** The device sits at the network edge; compromise would grant attacker full control of the router and potential footholds into connected networks. This can enable data exfiltration, traffic manipulation, or persistent presence across affected environments, with rapid impact on availability and integrity of network services.

**Most likely attack path** A network-scoped attacker can trigger a crafted request against the admin page without user interaction, using low privileges. The memory corruption via a buffer overflow could yield remote code execution on the device, with high impact on confidentiality, integrity and availability. Lateral movement is plausible within the local network if the attacker can access other devices through the router’s control plane or forwarded traffic.

**Who is most exposed** Commonly deployed in consumer and small-business networks; exposure is higher where remote administration is enabled or where devices sit directly on the WAN or poorly segmented LAN edge.

Detection ideas

  • Unexplained device reboots or crashes, memory dumps, or watchdog resets.
  • Unexpected spikes in memory usage or crash reports in system logs.
  • anomalous requests to admin pages (/goform/NatStaticSetting or similar) or repeated failed login attempts.
  • New or unusual processes/connections originating from the device.
  • Sudden changes to NAT/ACL rules or admin interface access from unusual IPs.

Mitigation and prioritisation

  • Apply vendor firmware update as a matter of urgency; verify patch is deployed across all affected devices.
  • Disable or tightly restrict remote management; block WAN access to admin interfaces; implement strong access controls.
  • Place affected devices behind network segmentation and enhanced firewall rules; limit exposure of NAT/static setting pages.
  • Monitor for indicators of compromise, exploit patterns, and anomalous router reboot events; enable IDS/IPS where available.
  • Plan a change-management window for firmware rollout and conduct post-deployment validation.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features