Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2147: Information Disclosure in Tenda AC21

0
Medium
VulnerabilityCVE-2026-2147cvecve-2026-2147
Published: Sun Feb 08 2026 (02/08/2026, 10:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

A weakness has been identified in Tenda AC21 16.03.08.16. This impacts an unknown function of the file /cgi-bin/DownloadLog of the component Web Management Interface. Executing a manipulation can lead to information disclosure. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:35:16 UTC

Technical Analysis

CVE-2026-2147 identifies an information disclosure vulnerability in the Tenda AC21 router firmware version 16.03.08.16. The issue resides in the Web Management Interface's /cgi-bin/DownloadLog endpoint, which handles log download functionality. An attacker can remotely manipulate requests to this endpoint to access sensitive information without requiring authentication or user interaction. The vulnerability likely stems from insufficient access control or improper validation of input parameters in the DownloadLog CGI script, allowing unauthorized retrieval of logs or configuration data. Such information disclosure can reveal network topology, device configuration, or user activity logs, which attackers can leverage for further exploitation or reconnaissance. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. Although no active exploitation in the wild is reported, a public exploit exists, increasing the urgency for mitigation. The vulnerability affects a widely used SOHO router model, which is common in residential and small business environments, potentially exposing a large number of devices globally.

Potential Impact

The primary impact of CVE-2026-2147 is unauthorized disclosure of sensitive information from affected Tenda AC21 routers. This can include device logs, configuration files, or other management data that may reveal network architecture, credentials, or usage patterns. Such information can facilitate targeted attacks, including credential theft, network intrusion, or lateral movement within compromised environments. While the vulnerability does not directly affect device integrity or availability, the leaked information can be a critical enabler for more severe attacks. Organizations relying on Tenda AC21 devices, especially in small office or home office settings, may face increased risk of privacy breaches and network compromise. The availability of a public exploit lowers the barrier for attackers, potentially increasing the frequency of scanning and exploitation attempts. The vulnerability's remote exploitability without authentication makes it a significant risk for exposed management interfaces, particularly those accessible from the internet.

Mitigation Recommendations

To mitigate CVE-2026-2147, organizations should take the following specific actions: 1) Immediately restrict remote access to the Tenda AC21 Web Management Interface by disabling WAN-side management or limiting access via firewall rules to trusted IP addresses only. 2) Monitor network traffic for unusual requests targeting /cgi-bin/DownloadLog or other management endpoints to detect potential exploitation attempts. 3) Apply firmware updates from Tenda as soon as a patch addressing this vulnerability is released; if no patch is available, consider temporary device replacement or segmentation. 4) Change default credentials and enforce strong, unique passwords for device management interfaces to reduce risk from other attack vectors. 5) Implement network segmentation to isolate SOHO routers from critical internal systems, limiting the impact of any compromise. 6) Educate users about the risks of exposing router management interfaces to the internet and encourage disabling unnecessary services. 7) Use intrusion detection/prevention systems (IDS/IPS) with signatures for known exploits targeting this vulnerability once available. These measures go beyond generic advice by focusing on access control, monitoring, and network architecture adjustments specific to this vulnerability and device type.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T07:51:35.170Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698862794b57a58fa14f79d0

Added to database: 2/8/2026, 10:16:25 AM

Last enriched: 2/23/2026, 9:35:16 PM

Last updated: 3/24/2026, 4:44:04 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses