Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1637: Stack-based Buffer Overflow in Tenda AC21

0
High
VulnerabilityCVE-2026-1637cvecve-2026-1637
Published: Thu Jan 29 2026 (01/29/2026, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 02/06/2026, 08:41:23 UTC

Technical Analysis

CVE-2026-1637 is a stack-based buffer overflow vulnerability identified in the Tenda AC21 router firmware version 16.03.08.16. The vulnerability resides in the function fromAdvSetMacMtuWan within the /goform/AdvSetMacMtuWan endpoint. This function improperly handles input parameters, allowing an attacker to overflow a stack buffer remotely. The overflow can overwrite the return address or other control data on the stack, enabling arbitrary code execution with the privileges of the affected process. The vulnerability requires no user interaction and no prior authentication, making it remotely exploitable over the network. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no active exploitation has been reported, a public exploit is available, increasing the risk of exploitation by threat actors. The vulnerability can lead to full device compromise, allowing attackers to intercept or manipulate network traffic, pivot into internal networks, or cause denial of service. The affected product, Tenda AC21, is a widely used consumer and small business router, often deployed in home and office environments. The lack of a vendor patch at the time of publication necessitates immediate mitigation actions to reduce exposure.

Potential Impact

For European organizations, this vulnerability poses significant risks. Compromise of Tenda AC21 routers can lead to interception and manipulation of sensitive data traversing the network, undermining confidentiality. Attackers gaining control of routers can alter routing, inject malicious payloads, or disrupt network availability, impacting business operations. Small and medium enterprises, as well as home office setups relying on Tenda AC21 devices, are particularly vulnerable due to limited network segmentation and security controls. Critical infrastructure entities using these routers may face elevated risks of targeted attacks aiming to disrupt services or exfiltrate data. The remote, unauthenticated nature of the exploit increases the attack surface, especially if management interfaces are exposed to the internet or poorly segmented internal networks. The availability of a public exploit lowers the barrier for attackers, potentially leading to widespread compromise if mitigations are not applied promptly.

Mitigation Recommendations

1. Immediate action should be taken to check for firmware updates from Tenda addressing this vulnerability; if available, apply them without delay. 2. If no patch is available, restrict access to the router’s management interfaces by implementing network segmentation and firewall rules to block unauthorized inbound connections, especially from the internet. 3. Employ network intrusion detection and prevention systems (IDS/IPS) to monitor and block exploit attempts targeting the /goform/AdvSetMacMtuWan endpoint. 4. Disable remote management features if not strictly necessary, or restrict them to trusted IP addresses only. 5. Conduct thorough network audits to identify all Tenda AC21 devices and replace or isolate those that cannot be patched. 6. Educate IT staff and users about the risks and signs of router compromise. 7. Monitor threat intelligence feeds for updates on exploit activity and vendor patches. 8. Consider deploying network-level mitigations such as web application firewalls (WAF) that can detect and block buffer overflow attack patterns targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-29T16:56:17.581Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697be268ac06320222c19d30

Added to database: 1/29/2026, 10:42:48 PM

Last enriched: 2/6/2026, 8:41:23 AM

Last updated: 2/7/2026, 8:55:42 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats