Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24105: n/a

0
Unknown
VulnerabilityCVE-2026-24105cvecve-2026-24105
Published: Mon Mar 02 2026 (03/02/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.

AI-Powered Analysis

AILast updated: 03/02/2026, 17:33:01 UTC

Technical Analysis

CVE-2026-24105 is a command injection vulnerability identified in the Tenda AC15V1.0 router firmware version V15.03.05.18_multi. The vulnerability exists in the goform/formsetUsbUnload endpoint, where the parameter 'v1' is accepted without proper input validation or sanitization. This parameter is directly passed to the doSystemCmd function, which executes system-level commands on the device. Because the input is unchecked, an attacker can craft malicious input to execute arbitrary commands on the router with the privileges of the system process. This can lead to unauthorized control over the device, allowing attackers to manipulate router configurations, intercept or redirect network traffic, or pivot to internal networks. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers who can reach the device's management interface. Although no public exploits have been reported yet, the simplicity of the attack vector and the critical role of routers in network infrastructure make this a significant threat. The lack of a CVSS score indicates the need for manual severity assessment. The vulnerability affects a specific firmware version of the Tenda AC15 router, a device popular in consumer and small business environments, especially in Asia and Europe. The absence of an official patch or mitigation guidance increases the urgency for network administrators to implement compensating controls.

Potential Impact

If exploited, this vulnerability can lead to complete compromise of the affected router, allowing attackers to execute arbitrary commands with system-level privileges. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and potential lateral movement to other devices. The confidentiality, integrity, and availability of network communications are at risk. Organizations relying on Tenda AC15 routers for critical network functions, including home offices, small businesses, and branch offices, could face significant operational disruptions and data breaches. The lack of authentication requirement and remote exploitability increase the likelihood of attacks, especially in environments where router management interfaces are exposed to untrusted networks. The potential impact extends to undermining trust in network infrastructure and increasing the attack surface for broader cyberattacks.

Mitigation Recommendations

1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management if not required. 2. Implement network-level firewall rules to block unauthorized access to the vulnerable endpoint (goform/formsetUsbUnload). 3. Monitor network traffic and router logs for unusual commands or access patterns indicative of exploitation attempts. 4. Contact Tenda support or check official channels regularly for firmware updates or patches addressing this vulnerability. 5. If no patch is available, consider replacing affected devices with models from vendors with active security support. 6. Employ network segmentation to isolate vulnerable devices from critical infrastructure. 7. Use intrusion detection/prevention systems (IDS/IPS) to detect and block command injection attempts targeting this vulnerability. 8. Educate users and administrators about the risks of exposing router management interfaces to the internet.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-21T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5c5cab6c0d8506faa2d02

Added to database: 3/2/2026, 5:15:54 PM

Last enriched: 3/2/2026, 5:33:01 PM

Last updated: 3/2/2026, 10:45:29 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses