Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1638: Command Injection in Tenda AC21

0
Medium
VulnerabilityCVE-2026-1638cvecve-2026-1638
Published: Thu Jan 29 2026 (01/29/2026, 23:32:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

A security flaw has been discovered in Tenda AC21 1.1.1.1/1.dmzip/16.03.08.16. The impacted element is the function mDMZSetCfg of the file /goform/mDMZSetCfg. The manipulation of the argument dmzIp results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:49:50 UTC

Technical Analysis

CVE-2026-1638 is a command injection vulnerability identified in the Tenda AC21 router firmware versions 1.1.1.1, 1.dmzip, and 16.03.08.16. The vulnerability resides in the mDMZSetCfg function, specifically in the /goform/mDMZSetCfg endpoint, which processes the dmzIp argument. Due to insufficient input validation or sanitization, an attacker can manipulate the dmzIp parameter to inject arbitrary shell commands. This flaw allows remote attackers to execute commands on the underlying operating system with the privileges of the router's web service process, potentially leading to full device compromise. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier to exploitation. Although no confirmed exploitation in the wild has been reported, the public availability of an exploit increases the likelihood of attacks. The vulnerability affects the confidentiality, integrity, and availability of the device, as attackers can execute arbitrary commands, disrupt services, or pivot into internal networks. The CVSS 4.0 base score of 5.3 reflects a medium severity rating, considering the network attack vector, lack of authentication, and partial impact on confidentiality, integrity, and availability. No official patches have been linked yet, so mitigation may rely on network-level controls and firmware updates once available.

Potential Impact

The impact of CVE-2026-1638 on organizations can be significant, especially for those relying on Tenda AC21 routers for network connectivity. Successful exploitation allows attackers to execute arbitrary commands remotely, which can lead to unauthorized control over the device. This can result in network disruption, interception or manipulation of traffic, deployment of malware or botnets, and lateral movement within the internal network. The compromise of router integrity can also undermine the security posture of connected systems, potentially exposing sensitive data or critical infrastructure. Since the vulnerability requires no authentication, attackers can scan and target vulnerable devices en masse, increasing the risk of widespread attacks. Organizations in sectors with high reliance on secure network infrastructure, such as enterprises, ISPs, and government agencies, may face operational disruptions and reputational damage. The absence of known exploits in the wild currently limits immediate impact, but the public exploit availability necessitates proactive defense measures.

Mitigation Recommendations

To mitigate CVE-2026-1638, organizations should first verify if their Tenda AC21 routers are running the affected firmware versions (1.1.1.1, 1.dmzip, 16.03.08.16) and prioritize upgrading to a patched firmware version once released by the vendor. In the absence of official patches, network administrators should restrict access to the router's management interface, especially the /goform/mDMZSetCfg endpoint, by implementing firewall rules that limit access to trusted IP addresses only. Disabling remote management features or changing default management ports can reduce exposure. Network segmentation should be employed to isolate vulnerable devices from critical systems. Monitoring network traffic for unusual requests targeting the dmzIp parameter or the /goform/mDMZSetCfg path can help detect exploitation attempts. Additionally, employing intrusion detection/prevention systems (IDS/IPS) with signatures for command injection attempts against Tenda routers can provide early warning. Regularly auditing router configurations and logs will assist in identifying suspicious activity. Finally, organizations should maintain an inventory of network devices to ensure timely identification and remediation of vulnerable equipment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-29T16:56:25.779Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697bf078ac06320222c697bc

Added to database: 1/29/2026, 11:42:48 PM

Last enriched: 2/23/2026, 9:49:50 PM

Last updated: 3/25/2026, 9:14:00 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses