Description
A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Published: 2026-03-30
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the Tenda CH22 firmware function formCreateFileName, triggered by manipulating the fileNameMit argument in /goform/createFileName. The overflow can corrupt the stack and allow an attacker to execute arbitrary code or crash the device, constituting a remote vulnerability with severe impact on confidentiality, integrity, and availability.

Affected Systems

CVE-2026-5152 affects the Tenda CH22 model running firmware version 1.0.0.1. Only this version is listed as vulnerable; newer or lower firmware revisions have not been reported as affected.

Risk and Exploitability

The reported CVSS score of 8.7 classifies this as a high severity flaw. The EPSS score of less than 1% indicates a relatively low probability of exploitation currently, and the vulnerability is not included in the CISA KEV catalog. Attackers can initiate the exploit remotely, likely from any network path that can reach the device’s web interface. Exploitation requires sending a carefully crafted payload to the vulnerable parameter; no local privileges are needed. Given the high CVSS and the public availability of the exploit, the risk to unpatched devices is significant if they are exposed to untrusted networks.

Generated by OpenCVE AI on April 2, 2026 at 13:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest firmware release from the official Tenda website that addresses this buffer overflow
  • If the vendor has not yet released a patch, disable remote management or restrict access to the device to trusted IP ranges only
  • Change any default or weak credentials and enable strong authentication
  • Monitor device logs for unusual activity and consider isolating the device from the production network until a patch is applied
  • Follow general best practices for securing networked embedded devices: limit exposed services, use network segmentation, and keep devices up to date

Generated by OpenCVE AI on April 2, 2026 at 13:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22
Vendors & Products Tenda ch22

Tue, 31 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Title Tenda CH22 createFileName formCreateFileName stack-based overflow
First Time appeared Tenda
Tenda ch22 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ch22 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ch22 Ch22 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T18:05:17.034Z

Reserved: 2026-03-30T13:33:02.568Z

Link: CVE-2026-5152

cve-icon Vulnrichment

Updated: 2026-03-31T16:14:14.894Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T21:17:11.057

Modified: 2026-04-02T12:10:08.320

Link: CVE-2026-5152

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:49Z

Weaknesses