Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2872: Stack-based Buffer Overflow in Tenda A21

0
High
VulnerabilityCVE-2026-2872cvecve-2026-2872
Published: Sat Feb 21 2026 (02/21/2026, 16:02:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: A21

Description

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 02/21/2026, 16:31:32 UTC

Technical Analysis

CVE-2026-2872 is a stack-based buffer overflow vulnerability identified in the Tenda A21 router firmware version 1.0.0.0. The flaw resides in the set_device_name function within the /goform/setBlackRule endpoint, which is responsible for MAC filtering configuration. Specifically, the vulnerability arises when the devName or mac argument is manipulated, causing the function to write beyond the bounds of a stack buffer. This overflow can corrupt the stack, potentially allowing an attacker to execute arbitrary code remotely. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 score of 8.7 reflects its high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability by enabling attackers to compromise the router, intercept or manipulate network traffic, or disrupt network services. Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The absence of official patches or mitigation guidance in the provided data suggests that affected users must implement alternative protective measures until a firmware update is available. This vulnerability highlights the critical need for secure coding practices in embedded device firmware, especially for network infrastructure devices like routers.

Potential Impact

The exploitation of CVE-2026-2872 can have severe consequences for organizations worldwide. Successful attacks can lead to full compromise of the affected Tenda A21 routers, allowing attackers to execute arbitrary code with system-level privileges. This can result in unauthorized access to internal networks, interception and manipulation of sensitive data, disruption of network services, and potential pivoting to other internal systems. For enterprises, this could mean data breaches, loss of business continuity, and reputational damage. For consumers, compromised routers can be used as part of botnets or for further malicious activities. The vulnerability’s remote exploitability without authentication or user interaction significantly increases the attack surface and risk. Given the critical role routers play in network security and traffic management, this vulnerability threatens the confidentiality, integrity, and availability of network communications. Organizations relying on Tenda A21 devices in their infrastructure must consider this a high-priority risk.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level protections such as implementing strict firewall rules to restrict access to the router’s management interface, especially blocking access from untrusted external networks. 2. Disable or restrict remote management features on the Tenda A21 router to limit exposure of the vulnerable endpoint. 3. Monitor network traffic for unusual activity that could indicate exploitation attempts targeting the /goform/setBlackRule endpoint. 4. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against this endpoint. 5. Segregate vulnerable routers on isolated network segments to minimize potential lateral movement if compromised. 6. Contact Tenda support or check official channels regularly for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. As a longer-term measure, consider replacing affected devices with models that have a proven security track record and receive timely security updates. 8. Educate network administrators about this vulnerability and the importance of minimizing exposure of router management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T14:40:45.438Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6999da89be58cf853ba20638

Added to database: 2/21/2026, 4:17:13 PM

Last enriched: 2/21/2026, 4:31:32 PM

Last updated: 2/22/2026, 4:11:07 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats