Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda ch22 Firmware
         | 
|
| CPEs | cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Tenda ch22 Firmware
         | 
Wed, 08 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda
         Tenda ch22  | 
|
| Vendors & Products | 
        
        Tenda
         Tenda ch22  | 
Wed, 08 Oct 2025 00:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A security vulnerability has been detected in Tenda CH22 up to 1.0.0.1. This issue affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset of the component HTTP Request Handler. The manipulation of the argument mit_ssid_index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. | |
| Title | Tenda CH22 HTTP Request AdvSetWrlsafeset formWrlsafeset stack-based overflow | |
| Weaknesses | CWE-119 CWE-121  | 
|
| References | 
         | |
| Metrics | 
        
        cvssV2_0
         
 
 
 
  | 
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-08T19:13:57.526Z
Reserved: 2025-10-07T11:05:39.796Z
Link: CVE-2025-11418
Updated: 2025-10-08T19:13:54.924Z
Status : Analyzed
Published: 2025-10-08T01:15:31.467
Modified: 2025-10-09T16:24:59.563
Link: CVE-2025-11418
No data.
                        OpenCVE Enrichment
                    Updated: 2025-10-08T13:35:10Z