Description
A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the function fromGetWifiGuestBasic of the file /goform/WifiGuestSet. Executing a manipulation of the argument guestWrlPwd/guestEn/guestSsid/hideSsid/guestSecurity can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Published: 2026-01-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate patch
AI Analysis

Impact

The flaw is a stack‑based buffer overflow triggered by manipulating the guest Wi‑Fi configuration parameters – guestWrlPwd, guestEn, guestSsid, hideSsid, and guestSecurity – in the fromGetWifiGuestBasic function of /goform/WifiGuestSet. Remote parties can supply overtly large or malformed values which overflow the stack, potentially allowing arbitrary code execution on the router’s firmware. Based on the description, it is inferred that an attacker who can reach the router’s web interface could exploit this flaw to execute code or cause a crash.

Affected Systems

Tenda AX1803 routers running firmware version 1.0.0.1 are affected. No other firmware versions were identified in the CNA data.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. The EPSS score of <1% shows a low historical exploitation probability, but the presence of a published exploit indicates that real‑world attacks are possible. The vulnerability can be exploited remotely by sending crafted requests to the device’s Web interface, as indicated by the CVE description. It is not listed in the CISA KEV catalog. The flaw belongs to CWE‑119 and CWE‑121, classic stack‑based overflow weaknesses.

Generated by OpenCVE AI on April 18, 2026 at 15:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest version that contains the stack‑overflow fix.
  • If the guest Wi‑Fi function is not required, disable the guest network feature to remove the vulnerable endpoint.
  • Restrict external access to the router’s management interface by applying firewall rules or enabling VPN‑only access; ensure the device is not reachable from untrusted networks.

Generated by OpenCVE AI on April 18, 2026 at 15:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:ax1803_firmware:*:*:*:*:*:*:*:*

Tue, 03 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ax1803 Firmware
CPEs cpe:2.3:h:tenda:ax1803:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1:*:*:*:*:*:*:*
Vendors & Products Tenda ax1803 Firmware

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ax1803
Vendors & Products Tenda
Tenda ax1803

Thu, 22 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the function fromGetWifiGuestBasic of the file /goform/WifiGuestSet. Executing a manipulation of the argument guestWrlPwd/guestEn/guestSsid/hideSsid/guestSecurity can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Title Tenda AX1803 WifiGuestSet fromGetWifiGuestBasic stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ax1803 Ax1803 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:53:35.403Z

Reserved: 2026-01-22T07:51:42.763Z

Link: CVE-2026-1329

cve-icon Vulnrichment

Updated: 2026-01-22T15:07:54.842Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T15:16:54.757

Modified: 2026-02-03T13:59:25.113

Link: CVE-2026-1329

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:30:03Z

Weaknesses