Impact
A stack-based buffer overflow exists in the AdvSetWan function of Tenda CH22 firmware 1.0.0.1. An attacker can supply a crafted wanmode argument to the /goform/AdvSetWan endpoint, causing the stack to be corrupted and allowing execution of arbitrary code on the device. This attack can compromise confidentiality, integrity, and availability of the router.
Affected Systems
Only Tenda CH22 units running firmware version 1.0.0.1 are identified as vulnerable. No other brands or models are mentioned in the CVE data.
Risk and Exploitability
The CVSS score of 8.7 signals a high severity vulnerability. The description states that the exploit can be performed remotely via the device’s web interface, and a public exploit has already been released. The EPSS value is unavailable and the vulnerability is not included in the CISA KEV catalog, but the known public exploit and high score suggest a non‑negligible likelihood of real‑world exploitation.
OpenCVE Enrichment