Description
A flaw has been found in Tenda CH22 1.0.0.1. The affected element is the function FormWriteFacMac of the file /goform/WriteFacMac. Executing a manipulation of the argument mac can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used.
Published: 2026-03-30
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

A function in the firmware, /goform/WriteFacMac, accepts a 'mac' parameter without proper validation. An attacker can inject arbitrary shell commands through this parameter, enabling remote code execution on the device. The vulnerability corresponds to command injection weaknesses, specifically CWE‑74 and CWE‑77. If exploited, the attacker can gain uncontrolled command execution, potentially compromising device configuration, network traffic, and the integrity of the router.

Affected Systems

The affected device is the Tenda CH22 router running firmware version 1.0.0.1. The vulnerability appears to be limited to this specific firmware release, but any device that has not applied a patch from Tenda remains vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS of 3% suggests a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, but an exploit has already been published, implying that the attack vector is reachable remotely via the router’s web interface. The attacker would need to send a crafted request to the /goform/WriteFacMac endpoint with a malicious 'mac' parameter. Successful exploitation would give the attacker full command execution capabilities over the device.

Generated by OpenCVE AI on April 2, 2026 at 13:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version available from Tenda that addresses the command injection flaw.
  • If a newer firmware cannot be installed, restrict management access to the router by configuring the firewall or router ACLs to allow only trusted internal IP addresses.
  • Monitor system logs and network traffic for unusual command‑execution activity and investigate any anomalous requests to the /goform/WriteFacMac endpoint.

Generated by OpenCVE AI on April 2, 2026 at 13:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22
Vendors & Products Tenda ch22

Tue, 31 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda CH22 1.0.0.1. The affected element is the function FormWriteFacMac of the file /goform/WriteFacMac. Executing a manipulation of the argument mac can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used.
Title Tenda CH22 WriteFacMac FormWriteFacMac command injection
First Time appeared Tenda
Tenda ch22 Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ch22 Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ch22 Ch22 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T15:29:21.999Z

Reserved: 2026-03-30T13:33:06.409Z

Link: CVE-2026-5153

cve-icon Vulnrichment

Updated: 2026-03-31T15:28:59.530Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T22:16:20.573

Modified: 2026-04-02T12:09:33.507

Link: CVE-2026-5153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:48Z

Weaknesses