Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4904: Stack-based Buffer Overflow in Tenda AC5

0
High
VulnerabilityCVE-2026-4904cvecve-2026-4904
Published: Thu Mar 26 2026 (03/26/2026, 23:11:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC5

Description

A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. Such manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:07:06 UTC

Technical Analysis

CVE-2026-4904 identifies a stack-based buffer overflow vulnerability in the Tenda AC5 router firmware version 15.03.06.47. The vulnerability exists in the formSetCfm function, which processes POST requests to the /goform/setcfm endpoint. Specifically, the issue stems from improper validation and handling of the funcpara1 parameter, allowing an attacker to overflow the stack buffer by sending a specially crafted POST request. This overflow can corrupt the stack, potentially enabling remote code execution or causing the device to crash, resulting in denial of service. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. While no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The affected product, Tenda AC5, is a consumer-grade Wi-Fi 6 router commonly used in home and small office environments, which may lack advanced security monitoring, increasing exposure risk.

Potential Impact

The impact of CVE-2026-4904 is significant for organizations and individuals using the Tenda AC5 router. Successful exploitation can lead to arbitrary code execution, allowing attackers to take full control of the device. This can result in interception or manipulation of network traffic, insertion of malicious payloads, or pivoting to other devices on the internal network. Additionally, attackers can cause denial of service by crashing the router, disrupting internet connectivity. For enterprises or service providers using these devices in branch offices or remote sites, this vulnerability could lead to compromised network security and data breaches. The lack of authentication requirement and ease of remote exploitation increase the threat level, especially in environments where these routers are directly exposed to the internet or poorly segmented networks.

Mitigation Recommendations

1. Immediate mitigation involves isolating the affected Tenda AC5 devices from untrusted networks, especially the internet, to reduce exposure. 2. Monitor network traffic for unusual POST requests targeting /goform/setcfm and implement intrusion detection/prevention rules to block suspicious payloads containing malformed funcpara1 parameters. 3. Apply vendor-provided firmware updates as soon as they become available; if no patch is currently released, contact Tenda support for guidance or consider temporary device replacement. 4. Employ network segmentation to limit access to the router management interface only to trusted administrators. 5. Disable remote management features if enabled, to prevent external exploitation. 6. Regularly audit router configurations and logs for signs of compromise or exploitation attempts. 7. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong network security policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-26T15:57:56.353Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6c6933c064ed76fdc298c

Added to database: 3/27/2026, 6:04:03 PM

Last enriched: 3/27/2026, 6:07:06 PM

Last updated: 3/27/2026, 11:39:35 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses