Metrics
Affected Vendors & Products
Fri, 06 Jun 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenda
Tenda ch22 Tenda ch22 Firmware |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Tenda
Tenda ch22 Tenda ch22 Firmware |
Thu, 05 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 04 Jun 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |
Title | Tenda CH22 addUserName formaddUserName stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-04T23:00:24.208Z
Updated: 2025-06-05T14:11:12.915Z
Reserved: 2025-06-04T11:01:54.274Z
Link: CVE-2025-5619

Updated: 2025-06-05T13:20:30.250Z

Status : Analyzed
Published: 2025-06-04T23:15:22.247
Modified: 2025-06-06T20:12:05.450
Link: CVE-2025-5619

No data.