CVE-2026-24105: n/a
An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.
AI Analysis
Technical Summary
CVE-2026-24105 is a command injection vulnerability identified in the Tenda AC15V1.0 router firmware version V15.03.05.18_multi. The vulnerability exists in the goform/formsetUsbUnload endpoint, where the parameter 'v1' is accepted without proper input validation or sanitization. This parameter is directly passed to the doSystemCmd function, which executes system-level commands on the device. Because the input is unchecked, an attacker can craft malicious input to execute arbitrary commands on the router with the privileges of the system process. This can lead to unauthorized control over the device, allowing attackers to manipulate router configurations, intercept or redirect network traffic, or pivot to internal networks. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers who can reach the device's management interface. Although no public exploits have been reported yet, the simplicity of the attack vector and the critical role of routers in network infrastructure make this a significant threat. The lack of a CVSS score indicates the need for manual severity assessment. The vulnerability affects a specific firmware version of the Tenda AC15 router, a device popular in consumer and small business environments, especially in Asia and Europe. The absence of an official patch or mitigation guidance increases the urgency for network administrators to implement compensating controls.
Potential Impact
If exploited, this vulnerability can lead to complete compromise of the affected router, allowing attackers to execute arbitrary commands with system-level privileges. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and potential lateral movement to other devices. The confidentiality, integrity, and availability of network communications are at risk. Organizations relying on Tenda AC15 routers for critical network functions, including home offices, small businesses, and branch offices, could face significant operational disruptions and data breaches. The lack of authentication requirement and remote exploitability increase the likelihood of attacks, especially in environments where router management interfaces are exposed to untrusted networks. The potential impact extends to undermining trust in network infrastructure and increasing the attack surface for broader cyberattacks.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management if not required. 2. Implement network-level firewall rules to block unauthorized access to the vulnerable endpoint (goform/formsetUsbUnload). 3. Monitor network traffic and router logs for unusual commands or access patterns indicative of exploitation attempts. 4. Contact Tenda support or check official channels regularly for firmware updates or patches addressing this vulnerability. 5. If no patch is available, consider replacing affected devices with models from vendors with active security support. 6. Employ network segmentation to isolate vulnerable devices from critical infrastructure. 7. Use intrusion detection/prevention systems (IDS/IPS) to detect and block command injection attempts targeting this vulnerability. 8. Educate users and administrators about the risks of exposing router management interfaces to the internet.
Affected Countries
China, India, Russia, Vietnam, Indonesia, Thailand, Malaysia, United Kingdom, Germany, France, Italy, Spain
CVE-2026-24105: n/a
Description
An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.
AI-Powered Analysis
Technical Analysis
CVE-2026-24105 is a command injection vulnerability identified in the Tenda AC15V1.0 router firmware version V15.03.05.18_multi. The vulnerability exists in the goform/formsetUsbUnload endpoint, where the parameter 'v1' is accepted without proper input validation or sanitization. This parameter is directly passed to the doSystemCmd function, which executes system-level commands on the device. Because the input is unchecked, an attacker can craft malicious input to execute arbitrary commands on the router with the privileges of the system process. This can lead to unauthorized control over the device, allowing attackers to manipulate router configurations, intercept or redirect network traffic, or pivot to internal networks. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers who can reach the device's management interface. Although no public exploits have been reported yet, the simplicity of the attack vector and the critical role of routers in network infrastructure make this a significant threat. The lack of a CVSS score indicates the need for manual severity assessment. The vulnerability affects a specific firmware version of the Tenda AC15 router, a device popular in consumer and small business environments, especially in Asia and Europe. The absence of an official patch or mitigation guidance increases the urgency for network administrators to implement compensating controls.
Potential Impact
If exploited, this vulnerability can lead to complete compromise of the affected router, allowing attackers to execute arbitrary commands with system-level privileges. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and potential lateral movement to other devices. The confidentiality, integrity, and availability of network communications are at risk. Organizations relying on Tenda AC15 routers for critical network functions, including home offices, small businesses, and branch offices, could face significant operational disruptions and data breaches. The lack of authentication requirement and remote exploitability increase the likelihood of attacks, especially in environments where router management interfaces are exposed to untrusted networks. The potential impact extends to undermining trust in network infrastructure and increasing the attack surface for broader cyberattacks.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management if not required. 2. Implement network-level firewall rules to block unauthorized access to the vulnerable endpoint (goform/formsetUsbUnload). 3. Monitor network traffic and router logs for unusual commands or access patterns indicative of exploitation attempts. 4. Contact Tenda support or check official channels regularly for firmware updates or patches addressing this vulnerability. 5. If no patch is available, consider replacing affected devices with models from vendors with active security support. 6. Employ network segmentation to isolate vulnerable devices from critical infrastructure. 7. Use intrusion detection/prevention systems (IDS/IPS) to detect and block command injection attempts targeting this vulnerability. 8. Educate users and administrators about the risks of exposing router management interfaces to the internet.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-21T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a5c5cab6c0d8506faa2d02
Added to database: 3/2/2026, 5:15:54 PM
Last enriched: 3/2/2026, 5:33:01 PM
Last updated: 3/2/2026, 10:45:29 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2583: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy
MediumCVE-2026-3338: CWE-347 (Improper Verification of Cryptographic Signature) in AWS AWS-LC
HighCVE-2026-3337: CWE-208 (Observable Timing Discrepancy) in AWS AWS-LC
MediumCVE-2026-3336: CWE-295 (Improper Certificate Validation) in AWS AWS-LC
HighCVE-2026-2256: CWE-94 Improper Control of Generation of Code ('Code Injection') in ModelScope ms-agent
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.