CVE-2026-2147: Information Disclosure in Tenda AC21
A weakness has been identified in Tenda AC21 16.03.08.16. This impacts an unknown function of the file /cgi-bin/DownloadLog of the component Web Management Interface. Executing a manipulation can lead to information disclosure. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
AI Analysis
Technical Summary
CVE-2026-2147 identifies an information disclosure vulnerability in the Tenda AC21 router firmware version 16.03.08.16. The issue resides in the Web Management Interface's /cgi-bin/DownloadLog endpoint, which handles log download functionality. An attacker can remotely manipulate requests to this endpoint to access sensitive information without requiring authentication or user interaction. The vulnerability likely stems from insufficient access control or improper validation of input parameters in the DownloadLog CGI script, allowing unauthorized retrieval of logs or configuration data. Such information disclosure can reveal network topology, device configuration, or user activity logs, which attackers can leverage for further exploitation or reconnaissance. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. Although no active exploitation in the wild is reported, a public exploit exists, increasing the urgency for mitigation. The vulnerability affects a widely used SOHO router model, which is common in residential and small business environments, potentially exposing a large number of devices globally.
Potential Impact
The primary impact of CVE-2026-2147 is unauthorized disclosure of sensitive information from affected Tenda AC21 routers. This can include device logs, configuration files, or other management data that may reveal network architecture, credentials, or usage patterns. Such information can facilitate targeted attacks, including credential theft, network intrusion, or lateral movement within compromised environments. While the vulnerability does not directly affect device integrity or availability, the leaked information can be a critical enabler for more severe attacks. Organizations relying on Tenda AC21 devices, especially in small office or home office settings, may face increased risk of privacy breaches and network compromise. The availability of a public exploit lowers the barrier for attackers, potentially increasing the frequency of scanning and exploitation attempts. The vulnerability's remote exploitability without authentication makes it a significant risk for exposed management interfaces, particularly those accessible from the internet.
Mitigation Recommendations
To mitigate CVE-2026-2147, organizations should take the following specific actions: 1) Immediately restrict remote access to the Tenda AC21 Web Management Interface by disabling WAN-side management or limiting access via firewall rules to trusted IP addresses only. 2) Monitor network traffic for unusual requests targeting /cgi-bin/DownloadLog or other management endpoints to detect potential exploitation attempts. 3) Apply firmware updates from Tenda as soon as a patch addressing this vulnerability is released; if no patch is available, consider temporary device replacement or segmentation. 4) Change default credentials and enforce strong, unique passwords for device management interfaces to reduce risk from other attack vectors. 5) Implement network segmentation to isolate SOHO routers from critical internal systems, limiting the impact of any compromise. 6) Educate users about the risks of exposing router management interfaces to the internet and encourage disabling unnecessary services. 7) Use intrusion detection/prevention systems (IDS/IPS) with signatures for known exploits targeting this vulnerability once available. These measures go beyond generic advice by focusing on access control, monitoring, and network architecture adjustments specific to this vulnerability and device type.
Affected Countries
China, India, United States, Brazil, Russia, Indonesia, Vietnam, Thailand, Mexico, South Africa
CVE-2026-2147: Information Disclosure in Tenda AC21
Description
A weakness has been identified in Tenda AC21 16.03.08.16. This impacts an unknown function of the file /cgi-bin/DownloadLog of the component Web Management Interface. Executing a manipulation can lead to information disclosure. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2147 identifies an information disclosure vulnerability in the Tenda AC21 router firmware version 16.03.08.16. The issue resides in the Web Management Interface's /cgi-bin/DownloadLog endpoint, which handles log download functionality. An attacker can remotely manipulate requests to this endpoint to access sensitive information without requiring authentication or user interaction. The vulnerability likely stems from insufficient access control or improper validation of input parameters in the DownloadLog CGI script, allowing unauthorized retrieval of logs or configuration data. Such information disclosure can reveal network topology, device configuration, or user activity logs, which attackers can leverage for further exploitation or reconnaissance. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. Although no active exploitation in the wild is reported, a public exploit exists, increasing the urgency for mitigation. The vulnerability affects a widely used SOHO router model, which is common in residential and small business environments, potentially exposing a large number of devices globally.
Potential Impact
The primary impact of CVE-2026-2147 is unauthorized disclosure of sensitive information from affected Tenda AC21 routers. This can include device logs, configuration files, or other management data that may reveal network architecture, credentials, or usage patterns. Such information can facilitate targeted attacks, including credential theft, network intrusion, or lateral movement within compromised environments. While the vulnerability does not directly affect device integrity or availability, the leaked information can be a critical enabler for more severe attacks. Organizations relying on Tenda AC21 devices, especially in small office or home office settings, may face increased risk of privacy breaches and network compromise. The availability of a public exploit lowers the barrier for attackers, potentially increasing the frequency of scanning and exploitation attempts. The vulnerability's remote exploitability without authentication makes it a significant risk for exposed management interfaces, particularly those accessible from the internet.
Mitigation Recommendations
To mitigate CVE-2026-2147, organizations should take the following specific actions: 1) Immediately restrict remote access to the Tenda AC21 Web Management Interface by disabling WAN-side management or limiting access via firewall rules to trusted IP addresses only. 2) Monitor network traffic for unusual requests targeting /cgi-bin/DownloadLog or other management endpoints to detect potential exploitation attempts. 3) Apply firmware updates from Tenda as soon as a patch addressing this vulnerability is released; if no patch is available, consider temporary device replacement or segmentation. 4) Change default credentials and enforce strong, unique passwords for device management interfaces to reduce risk from other attack vectors. 5) Implement network segmentation to isolate SOHO routers from critical internal systems, limiting the impact of any compromise. 6) Educate users about the risks of exposing router management interfaces to the internet and encourage disabling unnecessary services. 7) Use intrusion detection/prevention systems (IDS/IPS) with signatures for known exploits targeting this vulnerability once available. These measures go beyond generic advice by focusing on access control, monitoring, and network architecture adjustments specific to this vulnerability and device type.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-07T07:51:35.170Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698862794b57a58fa14f79d0
Added to database: 2/8/2026, 10:16:25 AM
Last enriched: 2/23/2026, 9:35:16 PM
Last updated: 3/24/2026, 4:44:04 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.