Metrics
Affected Vendors & Products
Tue, 28 Oct 2025 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda ch22 Firmware
         | 
|
| CPEs | cpe:2.3:h:tenda:ch22:*:*:*:*:*:*:*:* cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Tenda ch22 Firmware
         | 
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda
         Tenda ch22  | 
|
| Vendors & Products | 
        
        Tenda
         Tenda ch22  | 
Mon, 27 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Mon, 27 Oct 2025 12:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. | |
| Title | Tenda CH22 webExcptypemanFilter fromwebExcptypemanFilter buffer overflow | |
| Weaknesses | CWE-119 CWE-120  | 
|
| References | 
         | |
| Metrics | 
        
        cvssV2_0
         
 
 
 
  | 
Status: PUBLISHED
Assigner: VulDB
Published: 2025-10-27T12:32:08.278Z
Updated: 2025-10-27T13:07:43.656Z
Reserved: 2025-10-26T16:04:22.594Z
Link: CVE-2025-12273
Updated: 2025-10-27T13:07:17.087Z
Status : Analyzed
Published: 2025-10-27T13:15:43.183
Modified: 2025-10-28T02:07:59.857
Link: CVE-2025-12273
No data.