<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-5605 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5605/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5605/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda CH22 version 1.0.0.1 allows a remote attacker to execute arbitrary code by manipulating the 'GO' argument in the formWrlExtraSet function via the /goform/WrlExtraSet endpoint.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5605, affects Tenda CH22 router version 1.0.0.1. This flaw resides in the <code>formWrlExtraSet</code> function within the <code>/goform/WrlExtraSet</code> file. A remote, unauthenticated attacker can exploit a stack-based buffer overflow by sending a crafted HTTP request with a malicious value for the <code>GO</code> argument. Publicly available exploits exist, increasing the risk of widespread exploitation. Successful exploitation allows the attacker to potentially execute arbitrary code on the device, leading to a complete compromise of the router and the network it serves.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlExtraSet</code> endpoint.</li>
<li>The crafted request includes the <code>GO</code> argument with a string exceeding the expected buffer size in the <code>formWrlExtraSet</code> function.</li>
<li>The router&rsquo;s web server receives the request and passes the <code>GO</code> argument to the vulnerable function.</li>
<li>The <code>formWrlExtraSet</code> function attempts to copy the oversized <code>GO</code> argument into a fixed-size buffer on the stack.</li>
<li>This write operation overflows the buffer, overwriting adjacent memory regions, including the return address.</li>
<li>When the <code>formWrlExtraSet</code> function returns, it jumps to the address overwritten by the attacker.</li>
<li>The attacker&rsquo;s injected code executes with the privileges of the web server process, potentially allowing full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5605 can lead to complete compromise of the Tenda CH22 router. This includes unauthorized access to network traffic, modification of router settings, and the potential for the router to be used as a pivot point for further attacks within the network. Given the ease of exploitation and the public availability of exploits, a large number of devices are potentially at risk, impacting both home and small business users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/WrlExtraSet</code> with unusually long <code>GO</code> parameter values to detect potential exploitation attempts. Use the Sigma rule provided below.</li>
<li>Implement rate limiting on requests to <code>/goform/WrlExtraSet</code> to mitigate brute-force exploitation attempts.</li>
<li>Since there is no patch available, consider replacing affected Tenda CH22 1.0.0.1 routers with devices from vendors with timely security updates.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5605</category><category>buffer-overflow</category><category>tenda</category></item></channel></rss>