Impact
The vulnerability is a stack‑based buffer overflow in the fromAdvSetWan function of the Tenda CH22 firmware 1.0.0.1, triggered by overflowing the wanmode parameter in the /goform/AdvSetWan POST endpoint. An attacker can supply an oversized argument to corrupt the stack and arbitrary code execution on the device with the privileges of the web interface process, leading to full control over the router and the networks it connects.
Affected Systems
This flaw affects the Tenda CH22 router running firmware version 1.0.0.1. Any earlier firmware releases containing the same implementation of /goform/AdvSetWan are also vulnerable.
Risk and Exploitability
The CVSS base score is 8.7, indicating high severity, while the EPSS score is below 1%, suggesting a low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. The publicly available exploit can be executed remotely via crafted HTTP POST requests to the router’s web interface without local or administrative privileges.
OpenCVE Enrichment