Description
A flaw has been found in Tenda CH22 1.0.0.1. The affected element is the function FormWriteFacMac of the file /goform/WriteFacMac. Executing a manipulation of the argument mac can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used.
Published: 2026-03-30
Score: 5.3 Medium
EPSS: 2.7% Low
KEV: No
Impact: Remote Command Injection
Action: Immediate Patch
AI Analysis

Impact

The Tenda CH22 router running firmware 1.0.0.1 contains a flaw in the FormWriteFacMac function located at /goform/WriteFacMac. A crafted request that manipulates the mac parameter can inject arbitrary operating‑system commands, allowing an attacker to execute commands remotely on the device. The vulnerability is identified as a command injection weakness (CWE‑74, CWE‑77). Because the flaw is accessed through the web interface, a remote attacker can trigger it from any network that can reach the router’s administration port.

Affected Systems

Affected devices are Tenda CH22 routers with firmware version 1.0.0.1. No other versions were mentioned, so all units running this firmware are considered vulnerable. The flaw is specific to the router’s web‑based configuration interface and does not affect other product lines.

Risk and Exploitability

The CVSS score of 5.3 places this issue in the medium severity range, and the exploit has already been demonstrated and published, indicating a realistic threat. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but the public availability of an exploit suggests that the likelihood of real‑world attacks is non‑negligible. The likely attack vector is remote exploitation via HTTP requests to the router’s administrative interface from the Internet or an internal network that can reach the router.

Generated by OpenCVE AI on March 31, 2026 at 05:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the CH22 firmware to the latest version released by Tenda that resolves the command‑injection flaw.
  • Verify that the /goform/WriteFacMac endpoint no longer accepts malicious input after the firmware update.
  • If an update is not yet available, block external access to the router’s web‑management interface using firewall rules or disable remote‑management features.
  • Continuously monitor the device’s logs for attempts to interact with the FormWriteFacMac endpoint and investigate any suspicious activity.

Generated by OpenCVE AI on March 31, 2026 at 05:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22
Vendors & Products Tenda ch22

Tue, 31 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda CH22 1.0.0.1. The affected element is the function FormWriteFacMac of the file /goform/WriteFacMac. Executing a manipulation of the argument mac can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used.
Title Tenda CH22 WriteFacMac FormWriteFacMac command injection
First Time appeared Tenda
Tenda ch22 Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ch22 Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ch22 Ch22 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T15:29:21.999Z

Reserved: 2026-03-30T13:33:06.409Z

Link: CVE-2026-5153

cve-icon Vulnrichment

Updated: 2026-03-31T15:28:59.530Z

cve-icon NVD

Status : Received

Published: 2026-03-30T22:16:20.573

Modified: 2026-03-30T22:16:20.573

Link: CVE-2026-5153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:40:00Z

Weaknesses