Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2872: Stack-based Buffer Overflow in Tenda A21

0
High
VulnerabilityCVE-2026-2872cvecve-2026-2872
Published: Sat Feb 21 2026 (02/21/2026, 16:02:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: A21

Description

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 06:13:46 UTC

Technical Analysis

CVE-2026-2872 is a stack-based buffer overflow vulnerability identified in the Tenda A21 router firmware version 1.0.0.0. The vulnerability resides in the set_device_name function, which is part of the MAC Filtering Configuration Endpoint accessible via the /goform/setBlackRule URL. This function improperly handles the input parameter devName/mac, allowing an attacker to supply a crafted input that overflows the stack buffer. Because the endpoint is remotely accessible and requires no authentication or user interaction, an attacker can exploit this flaw over the network to execute arbitrary code or cause a denial of service by crashing the device. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact metrics show high confidentiality, integrity, and availability impact, meaning successful exploitation can lead to full device compromise. Although no known exploits are currently active in the wild, the public disclosure increases the likelihood of future exploitation attempts. The lack of available patches or updates at the time of disclosure necessitates immediate mitigation efforts by affected users. This vulnerability poses a significant risk to network infrastructure relying on Tenda A21 routers, potentially enabling attackers to gain persistent footholds or disrupt network operations.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code or cause denial of service on affected Tenda A21 routers without authentication or user interaction. This can lead to complete compromise of the router, enabling attackers to intercept, manipulate, or disrupt network traffic, degrade network availability, and potentially pivot to other internal systems. Organizations relying on these routers for network perimeter security or internal segmentation may face severe confidentiality, integrity, and availability breaches. The disruption or takeover of network devices can impact business continuity, data protection compliance, and operational security. Given the router's role in home and small business environments, exploitation could also affect individual users and small enterprises, potentially leading to data theft or unauthorized network access. The public disclosure of the vulnerability increases the risk of exploitation by threat actors, including opportunistic attackers and advanced persistent threats targeting network infrastructure.

Mitigation Recommendations

1. Immediately isolate affected Tenda A21 devices from critical network segments to limit exposure. 2. Monitor network traffic for suspicious requests targeting the /goform/setBlackRule endpoint, especially unusual or malformed devName/mac parameters. 3. If possible, disable or restrict access to the MAC Filtering Configuration Endpoint until a vendor patch is available. 4. Implement network-level protections such as firewall rules or intrusion prevention systems to block unauthorized access to the router management interfaces from untrusted networks. 5. Regularly check for firmware updates or security advisories from Tenda and apply patches promptly once released. 6. Consider replacing vulnerable devices with models from vendors with robust security update policies if patches are delayed. 7. Employ network segmentation to limit the impact of compromised devices. 8. Conduct security audits and vulnerability scans to identify affected devices and verify mitigation effectiveness. 9. Educate network administrators about this vulnerability and ensure incident response plans include steps for router compromise scenarios. These measures go beyond generic advice by focusing on immediate containment, monitoring, and access restrictions specific to the vulnerable endpoint.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T14:40:45.438Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6999da89be58cf853ba20638

Added to database: 2/21/2026, 4:17:13 PM

Last enriched: 3/1/2026, 6:13:46 AM

Last updated: 4/8/2026, 5:18:41 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses