Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability
A stack-based buffer overflow vulnerability in Tenda CH22 version 1.0.0.1 allows a remote attacker to execute arbitrary code by manipulating the 'GO' argument in the formWrlExtraSet function via the /goform/WrlExtraSet endpoint.
A critical vulnerability, identified as CVE-2026-5605, affects Tenda CH22 router version 1.0.0.1. This flaw resides in the formWrlExtraSet function within the /goform/WrlExtraSet file. A remote, unauthenticated attacker can exploit a stack-based buffer overflow by sending a crafted HTTP request with a malicious value for the GO argument. Publicly available exploits exist, increasing the risk of widespread exploitation. Successful exploitation allows the attacker to potentially execute arbitrary code on the device, leading to a complete compromise of the router and the network it serves.
Attack Chain
- The attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1.
- The attacker crafts a malicious HTTP POST request targeting the
/goform/WrlExtraSetendpoint. - The crafted request includes the
GOargument with a string exceeding the expected buffer size in theformWrlExtraSetfunction. - The router’s web server receives the request and passes the
GOargument to the vulnerable function. - The
formWrlExtraSetfunction attempts to copy the oversizedGOargument into a fixed-size buffer on the stack. - This write operation overflows the buffer, overwriting adjacent memory regions, including the return address.
- When the
formWrlExtraSetfunction returns, it jumps to the address overwritten by the attacker. - The attacker’s injected code executes with the privileges of the web server process, potentially allowing full control of the device.
Impact
Successful exploitation of CVE-2026-5605 can lead to complete compromise of the Tenda CH22 router. This includes unauthorized access to network traffic, modification of router settings, and the potential for the router to be used as a pivot point for further attacks within the network. Given the ease of exploitation and the public availability of exploits, a large number of devices are potentially at risk, impacting both home and small business users.
Recommendation
- Monitor web server logs for POST requests to
/goform/WrlExtraSetwith unusually longGOparameter values to detect potential exploitation attempts. Use the Sigma rule provided below. - Implement rate limiting on requests to
/goform/WrlExtraSetto mitigate brute-force exploitation attempts. - Since there is no patch available, consider replacing affected Tenda CH22 1.0.0.1 routers with devices from vendors with timely security updates.
Detection coverage 2
Detect Tenda CH22 Buffer Overflow Attempt via Long GO Parameter
criticalDetects potential exploitation attempts of the Tenda CH22 buffer overflow vulnerability (CVE-2026-5605) by identifying abnormally long 'GO' parameters in POST requests to the /goform/WrlExtraSet endpoint.
Detect Access to Tenda CH22 formWrlExtraSet Endpoint
lowDetects access to the /goform/WrlExtraSet endpoint on Tenda CH22 routers, which could indicate reconnaissance or exploitation attempts related to CVE-2026-5605.
Detection queries are kept inside the platform. Get full rules →