Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0640: Buffer Overflow in Tenda AC23

0
High
VulnerabilityCVE-2026-0640cvecve-2026-0640
Published: Tue Jan 06 2026 (01/06/2026, 15:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC23

Description

A weakness has been identified in Tenda AC23 16.03.07.52. This affects the function sscanf of the file /goform/PowerSaveSet. Executing a manipulation of the argument Time can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:17:51 UTC

Technical Analysis

CVE-2026-0640 is a buffer overflow vulnerability identified in the Tenda AC23 router firmware version 16.03.07.52. The issue arises from improper input validation in the sscanf function used in the /goform/PowerSaveSet endpoint, specifically when processing the 'Time' argument. An attacker can remotely send a specially crafted request to this endpoint, causing a buffer overflow condition. This overflow can corrupt memory, potentially allowing arbitrary code execution or causing the device to crash, leading to denial of service. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no active exploitation has been reported, a public exploit is available, increasing the urgency for mitigation. The vulnerability affects a widely used consumer and small business router model, which is often deployed in home and enterprise edge networks. The lack of an official patch at the time of disclosure necessitates immediate risk management and mitigation steps to prevent exploitation.

Potential Impact

The exploitation of CVE-2026-0640 can have severe consequences for organizations and individuals using the Tenda AC23 router. Successful exploitation may allow attackers to execute arbitrary code remotely, potentially gaining control over the device. This can lead to interception or manipulation of network traffic, unauthorized access to internal networks, and pivoting to other systems. The buffer overflow can also cause device crashes, resulting in denial of service and network outages. Given the router's role as a gateway device, compromise can undermine the confidentiality, integrity, and availability of the entire network it protects. This risk extends to both home users and enterprises relying on this hardware for secure internet connectivity. The availability of a public exploit increases the likelihood of attacks, including automated scanning and exploitation campaigns. Organizations may face operational disruptions, data breaches, and reputational damage if the vulnerability is exploited.

Mitigation Recommendations

1. Immediate mitigation should focus on isolating affected Tenda AC23 devices from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual requests targeting the /goform/PowerSaveSet endpoint, especially those containing suspicious 'Time' parameter values. 3. Apply network-level filtering or firewall rules to block access to the vulnerable endpoint from external sources. 4. Check for firmware updates or patches from Tenda regularly and apply them as soon as they become available. 5. If patches are not yet available, consider replacing vulnerable devices with alternative hardware from vendors with timely security support. 6. Implement network segmentation to limit the impact of a compromised router on internal systems. 7. Conduct regular vulnerability assessments and penetration testing to detect exploitation attempts. 8. Educate users and administrators about the risks and signs of compromise related to this vulnerability. 9. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting exploit attempts targeting this vulnerability. 10. Maintain robust backup and recovery procedures to restore network functionality in case of disruption.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T09:07:14.569Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d2ca3326bcb029a2b303d

Added to database: 1/6/2026, 3:39:15 PM

Last enriched: 2/23/2026, 11:17:51 PM

Last updated: 3/25/2026, 5:40:30 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses