{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12265","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-26T05:50:20.200Z","datePublished":"2025-10-27T11:02:07.933Z","dateUpdated":"2026-02-24T07:10:39.535Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T07:10:39.535Z"},"title":"Tenda CH22 VirtualSer fromVirtualSer buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"Tenda","product":"CH22","versions":[{"version":"1.0.0.1","status":"affected"}],"cpes":["cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Tenda CH22 1.0.0.1. Affected by this issue is the function fromVirtualSer of the file /goform/VirtualSer. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-28T08:48:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"hhsw34 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.329936","name":"VDB-329936 | Tenda CH22 VirtualSer fromVirtualSer buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.329936","name":"VDB-329936 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.674012","name":"Submit #674012 | Tenda CH22 V1.0.0.1 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/QIU-DIE/CVE/issues/18","tags":["broken-link","exploit","issue-tracking"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-27T12:14:18.547890Z","id":"CVE-2025-12265","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-27T12:14:52.668Z"}}]}}