A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown function of the file /public/. Executing manipulation can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
History

Tue, 30 Dec 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22 Firmware
CPEs cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
Vendors & Products Tenda ch22 Firmware

Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ch22
Vendors & Products Tenda
Tenda ch22

Fri, 26 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 25 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown function of the file /public/. Executing manipulation can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
Title Tenda CH22 public path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-12-25T03:32:06.775Z

Updated: 2025-12-26T16:33:52.331Z

Reserved: 2025-12-24T16:54:32.752Z

Link: CVE-2025-15076

cve-icon Vulnrichment

Updated: 2025-12-26T16:33:47.888Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-25T04:15:43.287

Modified: 2025-12-30T19:17:13.593

Link: CVE-2025-15076

cve-icon Redhat

No data.