Impact
A stack-based buffer overflow exists in the Tenda CH22 firmware function formCreateFileName, triggered by manipulating the fileNameMit argument in /goform/createFileName. The overflow can corrupt the stack and allow an attacker to execute arbitrary code or crash the device, constituting a remote vulnerability with severe impact on confidentiality, integrity, and availability.
Affected Systems
CVE-2026-5152 affects the Tenda CH22 model running firmware version 1.0.0.1. Only this version is listed as vulnerable; newer or lower firmware revisions have not been reported as affected.
Risk and Exploitability
The reported CVSS score of 8.7 classifies this as a high severity flaw. The EPSS score of less than 1% indicates a relatively low probability of exploitation currently, and the vulnerability is not included in the CISA KEV catalog. Attackers can initiate the exploit remotely, likely from any network path that can reach the device’s web interface. Exploitation requires sending a carefully crafted payload to the vulnerable parameter; no local privileges are needed. Given the high CVSS and the public availability of the exploit, the risk to unpatched devices is significant if they are exposed to untrusted networks.
OpenCVE Enrichment