Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:* |
Mon, 27 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ch22 Tenda ch22 Firmware |
|
| CPEs | cpe:2.3:h:tenda:ch22:*:*:*:*:*:*:*:* cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda ch22 Tenda ch22 Firmware |
Mon, 27 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Tenda CH22 1.0.0.1. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page results in buffer overflow. The attack must originate from the local network. The exploit has been made public and could be used. | |
| Title | Tenda CH22 SetIpBind fromSetIpBind buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T07:08:47.684Z
Reserved: 2025-10-25T17:03:56.836Z
Link: CVE-2025-12235
Updated: 2025-10-27T13:24:59.526Z
Status : Analyzed
Published: 2025-10-27T07:15:38.533
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-12235
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:04:04Z