CVE Alert: CVE-2025-12234 – Tenda – CH22

CVE-2025-12234

HIGHNo exploitation known

A vulnerability has been found in Tenda CH22 1.0.0.1. This affects the function fromSafeMacFilter of the file /goform/SafeMacFilter. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS v3.1 (8.8)
Vendor
Tenda
Product
CH22
Versions
1.0.0.1
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-27T06:22:21.764Z
Updated
2025-10-27T06:22:21.764Z

AI Summary Analysis

Risk verdict

High risk of remote code execution on affected devices; exploit is publicly disclosed and could be used opportunistically without user interaction.

Why this matters

Successful exploitation grants near-full control of the device, enabling modification of access controls, injection of further commands, and potential movement into the LAN. In business networks, this can disrupt connectivity, enable data exposure, or pave the way for pivoting to other systems.

Most likely attack path

Attacker, over the network, sends a crafted request to the SafeMacFilter page parameter without requiring user action, exploiting a buffer overflow with low device privileges. The vulnerability supports remote exploitation with high impact and returns to a normal scope, making lateral movement plausible if other network protections are weak.

Who is most exposed

Commonly deployed in home and small office environments; devices with web management exposed to the LAN or Internet (via remote management or misconfigurations) are at greatest risk.

Detection ideas

  • Sudden device reboots or crashlogs following web requests to SafeMacFilter.
  • Web server logs showing malformed or oversized page parameter attempts.
  • Memory allocation or corruption errors in device diagnostics.
  • Indicators of remote admin access attempts from unauthorised networks.
  • anomalous authentication failures preceding crashes.

Mitigation and prioritisation

  • Apply vendor patch/update to fixed version immediately; prioritise patching as soon as available.
  • Disable or restrict remote management to trusted networks; implement least-privilege access to the web interface.
  • Enforce network segmentation and restrict access to management interfaces behind VPNs or ACLs.
  • Monitor and alert on abnormal page parameter requests and sudden reboots; collect device crash dumps for triage.
  • Plan change-control for upgrade in production, including rollback and downtime windows.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features