Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4565: Buffer Overflow in Tenda AC21

0
High
VulnerabilityCVE-2026-4565cvecve-2026-4565
Published: Mon Mar 23 2026 (03/23/2026, 00:34:59 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

CVE-2026-4565 is a high-severity remote buffer overflow vulnerability in the Tenda AC21 router firmware version 16. 03. 08. 16. It affects the formSetQosBand function within the /goform/SetNetControlList endpoint, where improper handling of argument lists allows an attacker to overflow a buffer. The vulnerability can be exploited remotely without user interaction or prior authentication, potentially leading to full compromise of the device. Although no public exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. This flaw threatens the confidentiality, integrity, and availability of affected routers, which are widely used in home and small office networks. Organizations relying on Tenda AC21 devices should prioritize patching or mitigating this vulnerability to prevent unauthorized control or disruption of network infrastructure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 01:15:52 UTC

Technical Analysis

CVE-2026-4565 is a remote buffer overflow vulnerability identified in the Tenda AC21 router firmware version 16.03.08.16. The flaw resides in the formSetQosBand function of the /goform/SetNetControlList endpoint, which improperly processes input arguments, leading to a buffer overflow condition. This vulnerability allows an attacker to send specially crafted requests remotely to the router without requiring authentication or user interaction, exploiting the overflow to execute arbitrary code or cause denial of service. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with low attack complexity and no privileges or user interaction needed. The impact vector includes high confidentiality, integrity, and availability consequences, as successful exploitation can lead to full device compromise, enabling attackers to intercept, modify, or disrupt network traffic. Although no active exploitation in the wild has been reported, the availability of a public exploit increases the likelihood of future attacks. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts. This vulnerability is particularly critical given the widespread deployment of Tenda AC21 routers in consumer and small business environments, which often lack robust security monitoring.

Potential Impact

The exploitation of CVE-2026-4565 can have severe consequences for organizations and individuals using Tenda AC21 routers. Attackers gaining remote code execution can take full control of the device, enabling interception and manipulation of network traffic, insertion of malicious payloads, or pivoting to internal networks. This compromises confidentiality by exposing sensitive data, integrity by altering network communications or configurations, and availability by causing device crashes or network outages. For businesses, this can lead to data breaches, operational disruptions, and reputational damage. In home environments, compromised routers can serve as entry points for broader attacks or be conscripted into botnets. The ease of exploitation without authentication or user interaction significantly raises the threat level, especially in environments where these routers are exposed to the internet. The absence of a patch at disclosure time increases exposure duration, amplifying risk.

Mitigation Recommendations

1. Immediate mitigation should include restricting remote access to the router’s management interface by disabling WAN-side administration or applying firewall rules to block external access to the /goform/SetNetControlList endpoint. 2. Network segmentation should be employed to isolate vulnerable devices from critical assets. 3. Monitor network traffic for unusual requests targeting the QoS configuration endpoints indicative of exploitation attempts. 4. Where possible, upgrade to a firmware version that addresses this vulnerability once released by Tenda. 5. If no patch is available, consider replacing affected devices with alternative hardware from vendors with timely security updates. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this exploit to detect and block attacks. 7. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong network security policies. 8. Regularly audit router configurations to ensure no unauthorized changes have been made.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-22T08:29:00.489Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c090cbf4197a8e3bd36054

Added to database: 3/23/2026, 1:00:59 AM

Last enriched: 3/23/2026, 1:15:52 AM

Last updated: 3/23/2026, 3:32:47 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses