Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. | |
| Title | Tenda CH22 webExcptypemanFilter fromwebExcptypemanFilter buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-27T13:07:43.656Z
Reserved: 2025-10-26T16:04:22.594Z
Link: CVE-2025-12273
Updated: 2025-10-27T13:07:17.087Z
Status : Awaiting Analysis
Published: 2025-10-27T13:15:43.183
Modified: 2025-10-27T13:19:49.063
Link: CVE-2025-12273
No data.
OpenCVE Enrichment
No data.