<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5604 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5604/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 05 Apr 2026 23:16:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5604/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-overflow/</link><pubDate>Sun, 05 Apr 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5604) in Tenda CH22 1.0.0.1 allows remote attackers to execute arbitrary code by manipulating the 'standard' argument in the formCertLocalPrecreate function of the /goform/CertLocalPrecreate file within the Parameter Handler component.</description><content:encoded><![CDATA[<p>CVE-2026-5604 details a critical security vulnerability affecting Tenda CH22 router version 1.0.0.1. The vulnerability is a stack-based buffer overflow located in the <code>formCertLocalPrecreate</code> function within the <code>/goform/CertLocalPrecreate</code> file, which handles parameters. Attackers can exploit this flaw by manipulating the <code>standard</code> argument. The vulnerability can be triggered remotely, meaning an attacker does not need local access to the device. Given that a public exploit is available, this vulnerability poses a significant risk to users of the affected Tenda CH22 router. This allows unauthenticated attackers to potentially gain full control of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Tenda CH22 router version 1.0.0.1 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/CertLocalPrecreate</code> endpoint.</li>
<li>The attacker includes an overly long string as the value for the <code>standard</code> parameter in the HTTP request.</li>
<li>The Tenda CH22 router receives the malicious request and passes the <code>standard</code> parameter to the <code>formCertLocalPrecreate</code> function.</li>
<li>The <code>formCertLocalPrecreate</code> function copies the oversized <code>standard</code> argument into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions, including the return address of the function.</li>
<li>The attacker controls the overwritten return address to point to attacker-controlled code injected into memory, or to a Return-Oriented Programming (ROP) chain.</li>
<li>Upon function return, execution is redirected to the attacker&rsquo;s code, allowing them to execute arbitrary commands on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5604 allows a remote, unauthenticated attacker to execute arbitrary code on the Tenda CH22 router. This could lead to a complete compromise of the device, allowing the attacker to gain control over network traffic, modify router settings, or use the device as part of a botnet. Given the wide deployment of Tenda routers, a large number of devices could be vulnerable, making this a high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/CertLocalPrecreate</code> with unusually long <code>standard</code> parameters to identify potential exploit attempts (see rule: &ldquo;Detect Tenda CH22 Buffer Overflow Attempt via Long Standard Parameter&rdquo;).</li>
<li>Implement rate limiting on the <code>/goform/CertLocalPrecreate</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-5604.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda CH22 Router POST Request to CertLocalPrecreate&rdquo; to identify suspicious POST requests to the affected endpoint and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5604</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item></channel></rss>