CVE-2026-5156 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: April 1, 2026
Tenda CH22 - Buffer Overflow
Overview
Tenda CH22 1.0.0.1 contains a stack-based buffer overflow caused by manipulation of the "mit_linktype" argument in /goform/QuickIndex Parameter Handler, letting remote attackers cause memory corruption, exploit requires crafted request.
Severity & Score
Impact
Remote attackers can cause memory corruption leading to potential remote code execution or system crash.
Mitigation
Update to the latest version or apply vendor patches addressing this vulnerability.
References
Social Media Activity(1 post)
š CVE-2026-5156 - High (8.8) A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function formQuickIndex of the file /goform/QuickIndex of the component Parameter Handler. This manipulation of the argument mit_linktype causes stack-based buffer overflow. Th... š https://www.thehackerwire.com/vulnerability/CVE-2026-5156/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-5156
- Severity
- High
- CVSS Score
- 8.8
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 4.6%
- Social Posts
- 1
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H