Description
A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Published: 2026-03-30
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the Tenda CH22 device firmware 1.0.0.1, specifically within the formCreateFileName function exposed through the /goform/createFileName URL. Manipulation of the fileNameMit argument causes a buffer overflow that can overwrite the stack and allow execution of arbitrary code. The vulnerability is categorized under CWE‑119 (Buffer Overflow) and CWE‑121 (Stack-based Buffer Overflow). The attack may be performed remotely by sending crafted requests to the affected endpoint, and the exploit is publicly available.

Affected Systems

The vulnerable product is the Tenda CH22 wireless router running firmware version 1.0.0.1. Only this firmware revision is documented as affected; no other Tenda devices or firmware versions are explicitly listed as impacted.

Risk and Exploitability

The CVSS base score is 8.7, indicating a high severity. No EPSS score is reported, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote, network-facing HTTP requests to /goform/createFileName. Because the flaw can be triggered without authentication, a remote attacker could achieve local execution on the device, potentially compromising the router’s network configuration and exposing downstream networks.

Generated by OpenCVE AI on March 31, 2026 at 06:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest firmware for the Tenda CH22 that addresses the buffer overflow in formCreateFileName.
  • If a firmware update is not yet available, block external access to the /goform/createFileName endpoint using firewall rules or web‑server configuration.
  • Verify that the device no longer responds to the vulnerable endpoint after patching or blocking.
  • Continuously monitor device logs for attempts to exploit the endpoint and isolate the router from untrusted networks.

Generated by OpenCVE AI on March 31, 2026 at 06:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22
Vendors & Products Tenda ch22

Tue, 31 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Title Tenda CH22 createFileName formCreateFileName stack-based overflow
First Time appeared Tenda
Tenda ch22 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ch22 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ch22 Ch22 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T18:05:17.034Z

Reserved: 2026-03-30T13:33:02.568Z

Link: CVE-2026-5152

cve-icon Vulnrichment

Updated: 2026-03-31T16:14:14.894Z

cve-icon NVD

Status : Received

Published: 2026-03-30T21:17:11.057

Modified: 2026-03-30T21:17:11.057

Link: CVE-2026-5152

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:40:08Z

Weaknesses