Impact
A stack-based buffer overflow occurs in the formWrlExtraSet control of the Tenda CH22 device firmware 1.0.0.1 when an attacker manipulates the GO argument in the /goform/WrlExtraSet interface. The overflow can corrupt the execution stack and, if exploited successfully, can lead to arbitrary code execution on the device. The vulnerability falls under CWE‑119 and CWE‑121 and threatens confidentiality, integrity, and availability of the device and any networks it serves.
Affected Systems
The Tenda CH22 router running firmware version 1.0.0.1 is affected. No other Tenda products or firmware releases have been reported as vulnerable in the available data.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. No EPSS score is available, but the existence of a publicly available exploit and the ability to reach the vulnerable endpoint from external networks mean the likelihood of real-world exploitation is significant. The vulnerability is not currently listed in CISA’s KEV catalog, but it should still be treated as a serious threat.
OpenCVE Enrichment