Description
A vulnerability was determined in Tenda AC1206 15.03.06.23. Affected by this issue is the function formBehaviorManager of the file /goform/BehaviorManager of the component httpd. Executing a manipulation of the argument modulename/option/data/switch can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-01-05
Score: 5.3 Medium
EPSS: 1.2% Low
KEV: No
Impact: Command injection
Action: Immediate Patch
AI Analysis

Impact

A vulnerability has been identified in the Tenda AC1206 router firmware 15.03.06.23. The affected component is the httpd endpoint /goform/BehaviorManager, where the function formBehaviorManager parses the arguments modulename, option, data, and switch. Improper input validation allows an attacker to inject operating‑system commands, granting remote execution privileges. The flaw corresponds to CWE‑74 (Improper Neutralization of Special Elements used in a Command) and CWE‑77 (Command Injection).

Affected Systems

Tenda AC1206 routers running firmware version 15.03.06.23 are affected. The vulnerability is present in the httpd component and may impact all devices that expose the vulnerable endpoint, including those accessed via the web interface.

Risk and Exploitability

The severity is moderate with a CVSS score of 5.3, and the EPSS indicates a 1 % likelihood of exploitation. The vulnerability is attackable remotely through the web interface and has already been publicly disclosed, though it is not yet listed in the CISA KEV catalog. Attackers do not need user credentials to trigger the exploit if authentication is weak or bypassed; however, the exact authentication requirements are not detailed in the description. The overall risk is sufficient to warrant prompt remediation.

Generated by OpenCVE AI on April 18, 2026 at 08:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑provided security patch for Tenda AC1206 firmware 15.03.06.23 or a later release that resolves the command injection flaw.
  • Update the router firmware to the latest available version confirmed to fix the vulnerability.
  • If no patch is available, block or disable access to the /goform/BehaviorManager endpoint from outside the trusted network.
  • Restrict the web interface to a trusted IP range or enable the router’s built‑in firewall to restrict remote access to the vulnerable endpoint.

Generated by OpenCVE AI on April 18, 2026 at 08:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:ac1206_firmware:*:*:*:*:*:*:*:*

Mon, 12 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac1206 Firmware
CPEs cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*
Vendors & Products Tenda ac1206 Firmware

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac1206
Vendors & Products Tenda
Tenda ac1206

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 08:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda AC1206 15.03.06.23. Affected by this issue is the function formBehaviorManager of the file /goform/BehaviorManager of the component httpd. Executing a manipulation of the argument modulename/option/data/switch can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda AC1206 httpd BehaviorManager formBehaviorManager command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ac1206 Ac1206 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:13:25.661Z

Reserved: 2026-01-04T06:49:02.040Z

Link: CVE-2026-0581

cve-icon Vulnrichment

Updated: 2026-01-05T21:12:44.579Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T09:15:54.867

Modified: 2026-01-12T16:31:00.163

Link: CVE-2026-0581

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses