Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2876: Stack-based Buffer Overflow in Tenda A18

0
High
VulnerabilityCVE-2026-2876cvecve-2026-2876
Published: Sat Feb 21 2026 (02/21/2026, 17:32:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: A18

Description

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 06:20:07 UTC

Technical Analysis

CVE-2026-2876 identifies a critical stack-based buffer overflow vulnerability in the Tenda A18 router firmware version 15.13.07.13. The vulnerability resides in the parse_macfilter_rule function, which processes the deviceList parameter submitted to the /goform/setBlackRule endpoint. Improper input validation or bounds checking allows an attacker to supply a crafted deviceList argument that overflows the stack buffer. This overflow can corrupt the stack frame, potentially enabling arbitrary code execution or denial of service. The attack vector is remote network access to the vulnerable endpoint, requiring no authentication or user interaction, which significantly lowers the barrier to exploitation. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality, integrity, and availability, as well as ease of exploitation. While no public exploits have been observed in the wild, the public disclosure increases the likelihood of future exploitation attempts. The affected product, Tenda A18, is a consumer-grade wireless router widely used in various regions, making this vulnerability relevant for both home users and small businesses relying on this hardware for network connectivity and security.

Potential Impact

The exploitation of CVE-2026-2876 can have severe consequences for affected organizations and individuals. Successful exploitation may allow attackers to execute arbitrary code with elevated privileges on the router, leading to full device compromise. This can result in unauthorized network access, interception or manipulation of network traffic, disruption of internet connectivity, and potential pivoting to internal networks for further attacks. The integrity and confidentiality of data passing through the router can be compromised, and availability may be affected due to device crashes or reboots triggered by the overflow. Given the router’s role as a network gateway, the impact extends beyond the device itself to all connected systems. Organizations using Tenda A18 routers without mitigation or firmware updates are at risk of targeted attacks, especially in environments where these devices are exposed to untrusted networks or the internet.

Mitigation Recommendations

To mitigate CVE-2026-2876, organizations should immediately verify if their Tenda A18 routers are running firmware version 15.13.07.13 and restrict access to the /goform/setBlackRule endpoint from untrusted networks. Network segmentation and firewall rules should be implemented to block external access to router management interfaces. If possible, disable remote management features or restrict them to trusted IP addresses. Monitor network traffic for unusual requests targeting the deviceList parameter or the /goform/setBlackRule endpoint. Since no official patch is currently available, consider upgrading to a newer firmware version once released by Tenda that addresses this vulnerability. As a temporary measure, replace affected devices with alternative hardware from vendors with timely security updates. Additionally, implement network intrusion detection systems (NIDS) to detect exploitation attempts and maintain regular backups of router configurations to facilitate recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T16:05:23.156Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6999efa1be58cf853bad3f13

Added to database: 2/21/2026, 5:47:13 PM

Last enriched: 3/1/2026, 6:20:07 AM

Last updated: 4/8/2026, 1:19:52 PM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses