ID

VAR-202603-5509


CVE

CVE-2026-5153


TITLE

Shenzhen Tenda Technology Co.,Ltd. of ch22  Multiple vulnerabilities in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-009901

DESCRIPTION

A flaw has been found in Tenda CH22 1.0.0.1. The affected element is the function FormWriteFacMac of the file /goform/WriteFacMac. Executing a manipulation of the argument mac can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used. The exploit is publicly available and could be misused.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-5153 // JVNDB: JVNDB-2026-009901

AFFECTED PRODUCTS

vendor:tendamodel:ch22scope:eqversion:1.0.0.1

Trust: 1.0

vendor:tendamodel:ch22scope: - version: -

Trust: 0.8

vendor:tendamodel:ch22scope:eqversion:ch22 firmware 1.0.0.1

Trust: 0.8

vendor:tendamodel:ch22scope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-009901 // NVD: CVE-2026-5153

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2026-5153
value: LOW

Trust: 1.0

nvd@nist.gov: CVE-2026-5153
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-009901
value: HIGH

Trust: 0.8

cna@vuldb.com: CVE-2026-5153
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2026-009901
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2026-5153
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2026-5153
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2026-009901
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-009901 // NVD: CVE-2026-5153 // NVD: CVE-2026-5153

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:CWE-74

Trust: 1.0

problemtype:injection (CWE-74) [ others ]

Trust: 0.8

problemtype: Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

problemtype: Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-009901 // NVD: CVE-2026-5153

PATCH

title://vuldb.com/vuln/354185url:https://github.com/Litengzheng/vuldb_new/blob/main/CH22/vul_60/README.md

Trust: 0.8

sources: JVNDB: JVNDB-2026-009901

EXTERNAL IDS

db:NVDid:CVE-2026-5153

Trust: 2.6

db:JVNDBid:JVNDB-2026-009901

Trust: 0.8

sources: JVNDB: JVNDB-2026-009901 // NVD: CVE-2026-5153

REFERENCES

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://vuldb.com/vuln/354185

Trust: 1.0

url:https://vuldb.com/vuln/354185/cti

Trust: 1.0

url:https://vuldb.com/submit/780204

Trust: 1.0

url:https://github.com/litengzheng/vuldb_new/blob/main/ch22/vul_60/readme.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-5153

Trust: 0.8

sources: JVNDB: JVNDB-2026-009901 // NVD: CVE-2026-5153

SOURCES

db:JVNDBid:JVNDB-2026-009901
db:NVDid:CVE-2026-5153

LAST UPDATE DATE

2026-04-07T23:35:25.646000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-009901date:2026-04-06T02:55:00
db:NVDid:CVE-2026-5153date:2026-04-02T12:09:33.507

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-009901date:2026-04-06T00:00:00
db:NVDid:CVE-2026-5153date:2026-03-30T22:16:20.573