Description
A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-05
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote stack-based buffer overflow enabling potential code execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow occurs in the formWrlExtraSet control of the Tenda CH22 device firmware 1.0.0.1 when an attacker manipulates the GO argument in the /goform/WrlExtraSet interface. The overflow can corrupt the execution stack and, if exploited successfully, can lead to arbitrary code execution on the device. The vulnerability falls under CWE‑119 and CWE‑121 and threatens confidentiality, integrity, and availability of the device and any networks it serves.

Affected Systems

The Tenda CH22 router running firmware version 1.0.0.1 is affected. No other Tenda products or firmware releases have been reported as vulnerable in the available data.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. No EPSS score is available, but the existence of a publicly available exploit and the ability to reach the vulnerable endpoint from external networks mean the likelihood of real-world exploitation is significant. The vulnerability is not currently listed in CISA’s KEV catalog, but it should still be treated as a serious threat.

Generated by OpenCVE AI on April 6, 2026 at 01:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Tenda’s official website or support portal for a firmware update that addresses the formWrlExtraSet vulnerability and apply it immediately.
  • If no update is available, consider upgrading the device to a newer model that excludes the affected functionality.
  • As a temporary workaround, restrict external access to the /goform/WrlExtraSet endpoint using firewall rules or set the device to operate only in a trusted local network.
  • Monitor network traffic and device logs for abnormal attempts to access /goform/WrlExtraSet or signs of a buffer overflow exploitation.

Generated by OpenCVE AI on April 6, 2026 at 01:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22
Vendors & Products Tenda ch22

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda CH22 WrlExtraSet formWrlExtraSet stack-based overflow
First Time appeared Tenda
Tenda ch22 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ch22 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ch22 Ch22 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T15:16:14.289Z

Reserved: 2026-04-05T13:59:56.973Z

Link: CVE-2026-5605

cve-icon Vulnrichment

Updated: 2026-04-06T15:16:10.590Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T00:16:19.213

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:48:02Z

Weaknesses