Platform
tenda
Component
vuldb_new
Fixed in
1.0.1
CVE-2026-5155 describes a critical vulnerability affecting Tenda CH22 routers running version 1.0.0.1. This flaw is a stack-based buffer overflow located in the Parameter Handler's fromAdvSetWan function, specifically when manipulating the wanmode argument. Successful exploitation could allow an attacker to execute arbitrary code or cause a denial-of-service condition. A patch is pending from Tenda.
The stack-based buffer overflow vulnerability in the Tenda CH22 router allows a remote attacker to potentially gain control of the device. By crafting a malicious request that manipulates the wanmode parameter within the /goform/AdvSetWan endpoint, an attacker can overwrite memory on the stack. This can lead to arbitrary code execution, allowing the attacker to install malware, steal sensitive data (such as router configuration and user credentials), or disrupt network services. The public availability of an exploit significantly increases the risk of exploitation.
This vulnerability is considered highly exploitable due to the public availability of a proof-of-concept. It has been added to the CISA KEV catalog, indicating a high probability of exploitation. The vulnerability's ease of exploitation and potential impact warrant immediate attention and mitigation efforts.
Exploit Status
EPSS
0.03% (8% percentile)
CISA SSVC
CVSS Vector
Due to the lack of a publicly available patch, immediate mitigation strategies are crucial. Consider isolating the affected Tenda CH22 routers from the internet by placing them behind a firewall with strict access control rules. Implement a Web Application Firewall (WAF) to filter malicious requests targeting the /goform/AdvSetWan endpoint. Monitor router logs for unusual activity, particularly requests containing suspicious wanmode values. Once a firmware update is released by Tenda, apply it immediately. After upgrade, confirm functionality by accessing the router's web interface and verifying the WAN configuration.
Update the Tenda CH22 router firmware to a version later than 1.0.0.1 that fixes the stack-based buffer overflow vulnerability. Consult the manufacturer's website for the latest firmware version and update instructions.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5155 is a HIGH severity buffer overflow vulnerability in the Tenda CH22 router, allowing remote attackers to potentially execute code or cause a denial of service.
If you are using a Tenda CH22 router running version 1.0.0.1, you are potentially affected by this vulnerability. Check your router's firmware version and monitor for updates.
Currently, there is no official patch available. Implement mitigation strategies like firewall rules and WAFs. Upgrade to a patched firmware version as soon as Tenda releases one.
Yes, a proof-of-concept exploit is publicly available, indicating a high probability of active exploitation. It is listed on the CISA KEV catalog.
Please refer to the Tenda website or security mailing lists for official advisories and firmware updates related to CVE-2026-5155.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.