CVE-2025-15229

5.3 MEDIUM

📋 TL;DR

A buffer overflow vulnerability in Tenda CH22 routers allows remote attackers to cause denial of service by manipulating the LISTLEN parameter in the fromDhcpListClient function. This affects Tenda CH22 routers up to version 1.0.0.1. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • Tenda CH22
Versions: Up to and including 1.0.0.1
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router crash requiring physical reboot, disrupting all network connectivity for connected devices.

🟠

Likely Case

Router becomes unresponsive, requiring manual reboot to restore functionality.

🟢

If Mitigated

No impact if router is not internet-facing or behind proper network segmentation.

🌐 Internet-Facing: HIGH - Attackers can directly target exposed routers from the internet.
🏢 Internal Only: MEDIUM - Requires attacker to have internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub, making attacks easy to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates 2. Download latest firmware 3. Upload via router admin interface 4. Reboot router

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router management interface

Network segmentation

all

Place router behind firewall to restrict access

🧯 If You Can't Patch

  • Replace affected routers with updated models
  • Implement strict network access controls to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is 1.0.0.1 or earlier, device is vulnerable.

Check Version:

Check router web interface at 192.168.0.1 or 192.168.1.1

Verify Fix Applied:

Verify firmware version is higher than 1.0.0.1 after update.

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to /goform/DhcpListClient
  • Router reboot events
  • Unusual traffic patterns

Network Indicators:

  • HTTP POST requests to /goform/DhcpListClient with manipulated LISTLEN parameter

SIEM Query:

http.url:"/goform/DhcpListClient" AND http.method:POST

🔗 References

📤 Share & Export