CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical stack-based buffer overflow vulnerability in Tenda CH22 version 1.0.0.1 affecting the /goform/addUserName endpoint's Password parameter handling. An authenticated remote attacker can exploit this flaw to achieve complete system compromise including unauthorized access, data modification, and denial of service. Public exploit code has been disclosed and the vulnerability is actionable with low attack complexity, making it a high-priority threat.
Technical Context
The vulnerability exists in the formaddUserName function within the /goform/addUserName HTTP endpoint of Tenda CH22 router firmware. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), specifically a stack-based buffer overflow. User-supplied input from the Password parameter is not properly validated for length before being written to a fixed-size stack buffer, allowing an attacker to overwrite adjacent stack memory. This is a classic memory corruption vulnerability in embedded device firmware, common in router management interfaces written in C/C++ that lack modern memory safety protections. The CH22 is a residential networking device (CPE likely: tenda:ch22:*), making this vulnerability applicable to consumer and small-business network infrastructures.
Affected Products
Tenda CH22 (['1.0.0.1'])
Remediation
Primary Patch: Contact Tenda support or check Tenda's official website for firmware updates addressing CVE-2025-5619. Upgrade CH22 firmware to a patched version released after this CVE disclosure. (Tenda) Workaround - Network Segmentation: Restrict network access to the router's web management interface (/goform/*) to trusted administrative networks only. Disable remote management if not required. Use firewall rules to block external access to ports 80/443 on the router's management interface. (Network) Workaround - Access Control: Change default router credentials immediately. Disable any user accounts not actively in use. If supported, enforce strong password policies and implement account lockout mechanisms. (Device) Detection: Monitor for HTTP POST requests to /goform/addUserName with suspiciously long Password parameter values (>256 bytes). Log and alert on failed login attempts and unusual firmware activity. (IDS/IPS) Long-term: Plan device replacement if Tenda does not provide a timely security patch. Evaluate switching to routers with active security support and regular patching cadence. (Supply)
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16934