Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5204: Stack-based Buffer Overflow in Tenda CH22

0
High
VulnerabilityCVE-2026-5204cvecve-2026-5204
Published: Tue Mar 31 2026 (03/31/2026, 15:45:13 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CH22

Description

A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component Parameter Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 16:08:52 UTC

Technical Analysis

CVE-2026-5204 is a stack-based buffer overflow vulnerability identified in the Tenda CH22 router firmware version 1.0.0.1. The flaw exists in the formWebTypeLibrary function within the /goform/webtypelibrary endpoint, which is part of the device's parameter handling mechanism. Specifically, the vulnerability is triggered by manipulating the webSiteId argument, which is not properly validated or bounded, leading to a stack buffer overflow condition. This overflow can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation can allow an attacker to execute arbitrary code with elevated privileges on the device, potentially leading to full device compromise. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting high severity due to its network attack vector, lack of required privileges, and high impact on confidentiality, integrity, and availability. Although no public exploit code has been observed in the wild yet, the public disclosure increases the likelihood of future exploitation attempts. The lack of available patches at the time of disclosure further elevates the risk. This vulnerability affects the Tenda CH22 product line, which is commonly used in small office and home office environments, as well as some enterprise edge deployments.

Potential Impact

The impact of CVE-2026-5204 is significant for organizations using Tenda CH22 devices. Exploitation can lead to complete compromise of the device, enabling attackers to execute arbitrary code, potentially install persistent malware, intercept or manipulate network traffic, and disrupt network availability. This can result in loss of confidentiality of sensitive data traversing the device, integrity violations through unauthorized configuration changes or traffic manipulation, and denial of service conditions. Given the device's role as a network edge router, compromise can serve as a foothold for lateral movement into internal networks, increasing the overall risk exposure. Organizations relying on these devices for critical connectivity or security functions face elevated risks of operational disruption and data breaches. The remote and unauthenticated nature of the exploit vector makes it particularly dangerous, as attackers can scan and target vulnerable devices at scale without prior access.

Mitigation Recommendations

To mitigate CVE-2026-5204, organizations should immediately identify all Tenda CH22 devices running firmware version 1.0.0.1 and restrict their network exposure. Until an official patch is released, apply the following specific measures: 1) Isolate affected devices behind firewalls or VPNs to limit access to trusted networks only. 2) Disable remote management interfaces or restrict them to known IP addresses. 3) Monitor network traffic for unusual requests targeting /goform/webtypelibrary or suspicious webSiteId parameter usage. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures for buffer overflow attempts against Tenda devices. 5) Regularly audit device firmware versions and vendor advisories for patch availability and apply updates promptly once released. 6) Consider network segmentation to limit the impact of a compromised device. 7) Educate network administrators on the risks and signs of exploitation attempts. These targeted actions go beyond generic advice by focusing on limiting attack surface and early detection specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-31T08:42:55.909Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cbedf2e6bfc5ba1d248110

Added to database: 3/31/2026, 3:53:22 PM

Last enriched: 3/31/2026, 4:08:52 PM

Last updated: 4/1/2026, 3:51:24 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses