Description
A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component Parameter Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-31
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow occurs when the webSiteId parameter is processed by the Tenda CH22’s formWebTypeLibrary handler. This flaw can be triggered remotely via an HTTP request to the /goform/webtypelibrary endpoint, leading to memory corruption and the potential execution of arbitrary code on the device. The exploit has been publicly disclosed and is known to be usable by attackers.

Affected Systems

This vulnerability affects the Tenda CH22 router running firmware version 1.0.0.1. No other firmware versions are listed as affected, so the impact is confined to devices with this specific build.

Risk and Exploitability

The CVSS score of 8.7 denotes a high severity, and the EPSS score of less than 1% indicates that exploitation is rare at present, though the attack can be initiated from anywhere on the network. The vulnerability is not catalogued in the CISA Known Exploited Vulnerabilities list, but the remote nature of the attack vector and the potential for full system compromise make it a high‑risk issue.

Generated by OpenCVE AI on April 2, 2026 at 13:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that fixes the formWebTypeLibrary stack overflow.
  • If an updated firmware is not available, block external access to the /goform/webtypelibrary endpoint with a firewall or VPN rule to restrict it to trusted local traffic.
  • Change the default administrator password on the router to prevent unauthorized configuration changes.
  • Monitor the device’s logs for unexpected POST requests to /goform/webtypelibrary and investigate any anomalies.

Generated by OpenCVE AI on April 2, 2026 at 13:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22
Vendors & Products Tenda ch22

Tue, 31 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component Parameter Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda CH22 Parameter webtypelibrary formWebTypeLibrary stack-based overflow
First Time appeared Tenda
Tenda ch22 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ch22 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ch22 Ch22 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T16:02:44.391Z

Reserved: 2026-03-31T08:42:55.909Z

Link: CVE-2026-5204

cve-icon Vulnrichment

Updated: 2026-03-31T16:02:38.593Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T16:16:35.973

Modified: 2026-04-02T12:07:54.830

Link: CVE-2026-5204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:36Z

Weaknesses