Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1638: Command Injection in Tenda AC21

0
Medium
VulnerabilityCVE-2026-1638cvecve-2026-1638
Published: Thu Jan 29 2026 (01/29/2026, 23:32:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

CVE-2026-1638 is a medium severity command injection vulnerability found in the Tenda AC21 router firmware versions 1. 1. 1. 1, 1. dmzip, and 16. 03. 08. 16. The flaw exists in the mDMZSetCfg function within the /goform/mDMZSetCfg endpoint, where manipulation of the dmzIp parameter allows remote attackers to execute arbitrary commands. Exploitation requires no user interaction or authentication, and the vulnerability is remotely exploitable over the network.

AI-Powered Analysis

AILast updated: 01/29/2026, 23:57:07 UTC

Technical Analysis

CVE-2026-1638 is a command injection vulnerability affecting the Tenda AC21 router firmware versions 1.1.1.1, 1.dmzip, and 16.03.08.16. The vulnerability resides in the mDMZSetCfg function, specifically in the /goform/mDMZSetCfg web endpoint. The dmzIp parameter is improperly sanitized, allowing an attacker to inject arbitrary OS commands. This flaw can be exploited remotely without authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The vulnerability's CVSS 4.0 score is 5.3 (medium), reflecting the moderate impact and ease of exploitation but limited scope and privileges required. Successful exploitation could allow attackers to execute arbitrary commands on the router, potentially leading to full device compromise, network traffic interception, or pivoting to internal networks. Although no active exploitation has been reported, the public availability of an exploit increases the likelihood of attacks. The lack of vendor patches at the time of disclosure necessitates immediate mitigation steps to reduce exposure. The vulnerability does not require user interaction or prior authentication, increasing its risk profile. The affected devices are commonly used in small office and home office environments, which may be part of larger organizational networks, thus expanding the potential attack surface.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of Tenda AC21 routers could lead to unauthorized command execution, allowing attackers to alter router configurations, intercept or redirect network traffic, or establish persistent backdoors. This could result in data breaches, disruption of business operations, or lateral movement within corporate networks. Small and medium enterprises (SMEs) and home office setups using these routers are particularly vulnerable, as they may lack robust network segmentation or monitoring. Critical infrastructure sectors relying on these devices could face increased risk of targeted attacks or espionage. The remote and unauthenticated nature of the exploit means attackers can scan and compromise devices en masse, potentially leading to widespread disruption. Additionally, the public availability of an exploit increases the urgency for European organizations to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

1. Immediately identify and inventory all Tenda AC21 devices within the network, including those in remote or branch offices. 2. Restrict remote management access to the routers by disabling WAN-side web administration or limiting access to trusted IP addresses. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Monitor network traffic for unusual requests to the /goform/mDMZSetCfg endpoint or unexpected command execution patterns. 5. Apply any vendor-supplied firmware updates or patches as soon as they become available. 6. If patches are not yet available, consider temporary mitigations such as firewall rules blocking access to the vulnerable endpoint or replacing affected devices. 7. Educate IT staff about the vulnerability and the importance of securing network devices. 8. Conduct regular vulnerability scans to detect unpatched or vulnerable devices. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 10. Maintain backups of router configurations and network device inventories to facilitate rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-29T16:56:25.779Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697bf078ac06320222c697bc

Added to database: 1/29/2026, 11:42:48 PM

Last enriched: 1/29/2026, 11:57:07 PM

Last updated: 1/30/2026, 3:10:43 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats