Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-11423 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Tenda CH22 has a **Buffer Overflow** vulnerability. πŸ“‰ **Consequences**: Memory corruption occurs due to improper handling of the `page` parameter in `/goform/SafeEmailFilter`.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer).…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Tenda (China). πŸ“¦ **Product**: CH22 Router. πŸ“… **Affected Version**: **1.0.0.1** specifically. Check your firmware version immediately!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Impact**: CVSS Score is **High (9.8)**. 🎯 **Capabilities**: Attackers can achieve **Complete Confidentiality**, **Integrity**, and **Availability** loss. Essentially, **full system control** is possible.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. 🌐 **Network**: Attack Vector is **Network (AV:N)**. πŸ”‘ **Auth**: **No Privileges Required (PR:N)**. πŸ–±οΈ **User Interaction**: **None (UI:N)**. You can exploit this remotely without logging in.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit Status**: Public references exist on GitHub and VDB. πŸ“‚ **Tags**: Marked as `exploit` and `issue-tracking`.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Tenda CH22 devices. πŸ“‘ **Target**: Look for requests to `/goform/SafeEmailFilter`.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Patch Status**: The data does not explicitly confirm a fixed version. ⚠️ **Action**: Visit the official Tenda website or check VDB-327358 for the latest patch notes. Assume it is **unpatched** until confirmed.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If no patch is available, **restrict network access** to the management interface. 🚫 **Block**: Block external access to port 80/443 and the `/goform/` endpoints.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **Immediate Action Required**. With a CVSS of 9.8 and no auth required, this is a **high-priority** vulnerability. Patch or isolate immediately!