Impact
A stack-based buffer overflow exists in the Tenda CH22 device firmware 1.0.0.1, specifically within the formCreateFileName function exposed through the /goform/createFileName URL. Manipulation of the fileNameMit argument causes a buffer overflow that can overwrite the stack and allow execution of arbitrary code. The vulnerability is categorized under CWE‑119 (Buffer Overflow) and CWE‑121 (Stack-based Buffer Overflow). The attack may be performed remotely by sending crafted requests to the affected endpoint, and the exploit is publicly available.
Affected Systems
The vulnerable product is the Tenda CH22 wireless router running firmware version 1.0.0.1. Only this firmware revision is documented as affected; no other Tenda devices or firmware versions are explicitly listed as impacted.
Risk and Exploitability
The CVSS base score is 8.7, indicating a high severity. No EPSS score is reported, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote, network-facing HTTP requests to /goform/createFileName. Because the flaw can be triggered without authentication, a remote attacker could achieve local execution on the device, potentially compromising the router’s network configuration and exposing downstream networks.
OpenCVE Enrichment