Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2148: Information Disclosure in Tenda AC21

0
Medium
VulnerabilityCVE-2026-2148cvecve-2026-2148
Published: Sun Feb 08 2026 (02/08/2026, 10:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

CVE-2026-2148 is an information disclosure vulnerability in the Tenda AC21 router's web management interface, specifically in the /cgi-bin/DownloadFlash component. The flaw allows remote attackers to access sensitive information without authentication or user interaction. The vulnerability affects firmware version 16. 03. 08. 16 and has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Exploitation requires only network access and low attack complexity. Although no known exploits are currently observed in the wild, public exploit details exist, increasing risk.

AI-Powered Analysis

AILast updated: 02/08/2026, 11:15:33 UTC

Technical Analysis

CVE-2026-2148 is a medium-severity information disclosure vulnerability identified in the Tenda AC21 router, firmware version 16.03.08.16. The vulnerability resides in an unspecified function within the /cgi-bin/DownloadFlash endpoint of the device's web management interface. This flaw allows an unauthenticated remote attacker to manipulate the interface and retrieve sensitive information from the device. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network with low attack complexity. The disclosed exploit potentially enables attackers to gain access to configuration details, firmware data, or other sensitive information that could facilitate further attacks or network compromise. Although no confirmed exploitation in the wild has been reported, the public availability of exploit details increases the likelihood of future attacks. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) reflects network attack vector, no privileges or user interaction required, and low confidentiality impact without integrity or availability effects. The vulnerability is specific to the Tenda AC21 router, a consumer and small business networking device, which is commonly deployed in home and office environments.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive router information, which could include network configuration, credentials, or firmware details. Such information leakage can facilitate lateral movement, targeted attacks, or network reconnaissance by threat actors. Organizations relying on Tenda AC21 routers for critical network connectivity or management may experience confidentiality breaches, potentially exposing internal network topology or administrative credentials. This could lead to further compromise of internal systems or data exfiltration. Small and medium enterprises, as well as home office setups using these routers, are particularly vulnerable due to potentially weaker network segmentation and security controls. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts. While the vulnerability does not directly impact integrity or availability, the information disclosure can be a stepping stone for more severe attacks.

Mitigation Recommendations

1. Monitor Tenda's official channels for firmware updates addressing CVE-2026-2148 and apply patches promptly once available. 2. Restrict access to the router's web management interface by limiting it to trusted internal networks or specific management VLANs. 3. Disable remote management features if not required, especially WAN-side access to the web interface. 4. Implement network segmentation to isolate management interfaces from general user networks. 5. Employ strong, unique administrative passwords and consider multi-factor authentication if supported. 6. Use network intrusion detection systems (NIDS) to monitor for suspicious requests targeting /cgi-bin/DownloadFlash or unusual HTTP activity. 7. Regularly audit router configurations and logs for signs of unauthorized access or information leakage attempts. 8. Educate users and administrators about the risks of exposing management interfaces to untrusted networks. 9. Consider replacing affected devices with models from vendors with more robust security track records if patching is delayed or unsupported.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T07:51:37.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69886cfc4b57a58fa161c44c

Added to database: 2/8/2026, 11:01:16 AM

Last enriched: 2/8/2026, 11:15:33 AM

Last updated: 2/8/2026, 1:33:17 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats