Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2138: Buffer Overflow in Tenda TX9

0
High
VulnerabilityCVE-2026-2138cvecve-2026-2138
Published: Sun Feb 08 2026 (02/08/2026, 06:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: TX9

Description

A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:33:07 UTC

Technical Analysis

CVE-2026-2138 is a critical buffer overflow vulnerability identified in the Tenda TX9 router firmware up to version 22.03.02.10_multi. The vulnerability resides in the function sub_42D03C within the /goform/SetStaticRouteCfg endpoint, which handles static route configuration via HTTP requests. Improper validation or manipulation of the argument list passed to this function leads to a buffer overflow, allowing an attacker to overwrite memory beyond the intended buffer boundaries. This can result in arbitrary code execution with elevated privileges on the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 score of 8.7 reflects the ease of exploitation (network attack vector, low attack complexity), no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. While no active exploitation in the wild has been reported yet, the public availability of exploit code significantly increases the likelihood of attacks. The vulnerability affects a widely used consumer and small business router model, potentially exposing home and enterprise networks to compromise, data interception, or disruption of network services.

Potential Impact

The exploitation of CVE-2026-2138 can have severe consequences for organizations and individuals using Tenda TX9 routers. Attackers can remotely execute arbitrary code, potentially gaining full control over the device. This can lead to interception or manipulation of network traffic, unauthorized access to internal networks, disruption of network availability, and use of the compromised router as a pivot point for further attacks. Confidential data passing through the router may be exposed or altered, undermining data integrity and privacy. The availability of the device can be impacted by crashes or malicious reconfiguration, causing denial of service. Given the router's role as a network gateway, the vulnerability poses a significant risk to both home users and enterprises relying on Tenda TX9 for connectivity and network security.

Mitigation Recommendations

To mitigate CVE-2026-2138, organizations should immediately check for firmware updates from Tenda addressing this vulnerability and apply them as soon as they become available. In the absence of an official patch, network administrators should restrict access to the router's management interfaces, especially the /goform/SetStaticRouteCfg endpoint, by implementing firewall rules that limit access to trusted IP addresses only. Disabling remote management features or moving management interfaces to isolated management VLANs can reduce exposure. Monitoring network traffic for unusual requests targeting static route configuration endpoints can help detect exploitation attempts. Additionally, organizations should consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. Regularly auditing router configurations and maintaining strong network segmentation will further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T21:02:53.143Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698829f0f9fa50a62f667bd7

Added to database: 2/8/2026, 6:15:12 AM

Last enriched: 2/23/2026, 9:33:07 PM

Last updated: 3/25/2026, 8:39:55 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses