Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24103: n/a

0
Unknown
VulnerabilityCVE-2026-24103cvecve-2026-24103
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A buffer overflow vulnerability was discovered in goform/formSetMacFilterCfg in Tenda AC15V1.0 V15.03.05.18_multi.

AI-Powered Analysis

AILast updated: 03/03/2026, 15:33:07 UTC

Technical Analysis

CVE-2026-24103 is a security vulnerability identified as a buffer overflow in the goform/formSetMacFilterCfg endpoint of the Tenda AC15V1.0 router firmware version V15.03.05.18_multi. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, leading to memory corruption. In this case, the vulnerability lies in the router’s web management interface responsible for setting MAC filter configurations. An attacker can exploit this by sending a specially crafted HTTP request to the vulnerable endpoint, causing the router to overwrite adjacent memory. This can result in arbitrary code execution, allowing the attacker to take control of the device, or cause a denial of service by crashing the router. The vulnerability does not require authentication, meaning it can be exploited remotely without valid credentials, increasing the attack surface. Although no known exploits are currently in the wild and no patches have been published, the flaw’s presence in a widely used consumer router model poses a significant risk. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed, but the technical nature and potential impact suggest a high severity level. The router model affected is primarily distributed in Asian markets, especially China, where Tenda has a strong presence. The vulnerability could be leveraged by attackers to disrupt home and small business networks or as a foothold for further attacks within larger organizational networks.

Potential Impact

The impact of CVE-2026-24103 is potentially severe for organizations and individuals using the Tenda AC15V1.0 router. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full compromise of the device. This could enable attackers to intercept, modify, or redirect network traffic, disrupt internet connectivity, or use the compromised router as a pivot point for lateral movement within a network. The vulnerability threatens confidentiality, integrity, and availability of network communications. For small businesses and home users relying on these routers, this could result in data breaches, service outages, and unauthorized access to internal resources. Enterprises using these devices in branch offices or remote sites may face increased risk of network intrusion. The absence of authentication requirements for exploitation further elevates the threat, as attackers do not need valid credentials. Although no exploits are currently known, the vulnerability’s nature makes it a prime target for future weaponization by threat actors. The lack of an official patch means affected users remain exposed until a firmware update is released.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface by limiting it to trusted internal networks or specific IP addresses using firewall rules. 2. Disable remote management features if not required, especially access to the web interface from WAN. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the goform/formSetMacFilterCfg endpoint. 4. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. Consider replacing affected devices with models from vendors with a stronger security track record if patching is delayed. 7. Educate users about the risks of exposing router management interfaces to the internet and enforce strong administrative passwords. 8. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting exploitation attempts targeting known router vulnerabilities. 9. Maintain backups of router configurations to facilitate recovery in case of compromise. 10. Engage with Tenda support channels to report the vulnerability and request timely remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-21T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a6fbbdd1a09e29cb5117ba

Added to database: 3/3/2026, 3:18:21 PM

Last enriched: 3/3/2026, 3:33:07 PM

Last updated: 3/4/2026, 6:44:40 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses