Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4253: OS Command Injection in Tenda AC8

0
Medium
VulnerabilityCVE-2026-4253cvecve-2026-4253
Published: Mon Mar 16 2026 (03/16/2026, 17:02:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC8

Description

CVE-2026-4253 is a medium severity OS command injection vulnerability in the Tenda AC8 router firmware version 16. 03. 50. 11. It affects the web interface component, specifically the route_set_user_policy_rule function in /cgi-bin/UploadCfg. An attacker can remotely manipulate the wans. policy. list1 argument to execute arbitrary OS commands without user interaction or authentication. Although the exploit code is publicly available, no widespread exploitation has been reported yet. This vulnerability could allow attackers to compromise the router, potentially impacting network confidentiality and integrity.

AI-Powered Analysis

AILast updated: 03/16/2026, 17:35:26 UTC

Technical Analysis

CVE-2026-4253 identifies a security flaw in the Tenda AC8 router firmware version 16.03.50.11, specifically within the web interface's route_set_user_policy_rule function located in the /cgi-bin/UploadCfg file. The vulnerability arises from improper sanitization of the wans.policy.list1 parameter, which can be manipulated remotely to inject and execute arbitrary operating system commands. This OS command injection vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The flaw allows an attacker to execute commands with elevated privileges, potentially leading to full compromise of the router device. The vulnerability has a CVSS 4.0 base score of 5.1, reflecting a medium severity level due to the requirement of some privileges (PR:H) and limited impact on confidentiality, integrity, and availability. Although no known exploits in the wild have been reported, the public release of exploit code increases the risk of exploitation. The affected component is critical as routers serve as network gateways, and compromise can lead to interception, manipulation, or disruption of network traffic. No official patches have been linked yet, so mitigation relies on network-level controls and firmware updates when available.

Potential Impact

The exploitation of CVE-2026-4253 can lead to unauthorized remote code execution on affected Tenda AC8 routers, potentially allowing attackers to gain control over the device. This can result in interception or manipulation of network traffic, disruption of network services, and the establishment of persistent footholds within organizational networks. The confidentiality of internal communications may be compromised, and attackers could pivot to other internal systems. For organizations relying on Tenda AC8 routers, especially in small to medium business or home office environments, this vulnerability poses a significant risk to network security and data integrity. The medium severity rating reflects that while the impact is serious, exploitation requires some privileges and the scope of affected devices is limited to a specific firmware version. However, the public availability of exploit code increases the likelihood of opportunistic attacks, potentially targeting less-secured or unmonitored networks.

Mitigation Recommendations

Organizations should immediately verify if their Tenda AC8 routers are running firmware version 16.03.50.11 and restrict access to the router’s web interface from untrusted networks. Network segmentation should be employed to isolate vulnerable devices from critical infrastructure. Implement strict firewall rules to block unauthorized inbound traffic to the router’s management interface. Monitor network traffic for unusual patterns indicative of exploitation attempts targeting the /cgi-bin/UploadCfg endpoint. Since no official patch is currently linked, organizations should contact Tenda support for firmware updates or advisories. As a temporary measure, disable remote management features if enabled. Employ intrusion detection systems with signatures for OS command injection attempts. Regularly audit router configurations and logs to detect unauthorized changes. Finally, consider replacing affected devices with models that have confirmed security updates if remediation is delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-16T06:16:07.224Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b83bfc9d4df451837721b2

Added to database: 3/16/2026, 5:21:00 PM

Last enriched: 3/16/2026, 5:35:26 PM

Last updated: 3/16/2026, 6:12:39 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses