Description
A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by this vulnerability is the function sub_432580 of the file /goform/fast_setting_wifi_set. This manipulation of the argument ssid causes buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Patch Now
AI Analysis

Impact

A buffer overflow exists in the sub_432580 function of the /goform/fast_setting_wifi_set page on Tenda TX9 routers up to firmware 22.03.02.10_multi. By manipulating the SSID parameter, an attacker can overflow a buffer on the device, potentially leading to remote code execution or denial of service. The flaw is categorized as CWE‑119 and CWE‑120, indicative of an unsafe buffer handling vulnerability.

Affected Systems

The vulnerability affects Tenda TX9 router models with firmware versions older than or equal to 22.03.02.10_multi. Users operating these routers should verify their firmware revision and update to a patched release when one becomes available.

Risk and Exploitability

The CVSS base score of 8.7 highlights high severity. With an EPSS score below 1 % and no presence in the CISA KEV catalog, current exploitation likelihood is low; however, the flaw is publicly disclosed and the attack can be launched remotely via the wireless configuration interface, as the input is received over the network. If exploited, an attacker could gain arbitrary code execution on the device or disrupt network services.

Generated by OpenCVE AI on April 18, 2026 at 13:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest firmware revision provided by Tenda that patches the buffer overflow in the fast_setting_wifi_set handler.
  • If an update is unavailable, block external access to the router's web management interface by applying firewall rules or disabling remote configuration to prevent the exploitation vector.
  • Enforce network segmentation or place the router in a dedicated management VLAN so that any compromise is restricted to the management plane.

Generated by OpenCVE AI on April 18, 2026 at 13:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda tx9 Firmware
CPEs cpe:2.3:h:tenda:tx9:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:tx9_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda tx9 Firmware

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda tx9
Vendors & Products Tenda
Tenda tx9

Sun, 08 Feb 2026 07:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by this vulnerability is the function sub_432580 of the file /goform/fast_setting_wifi_set. This manipulation of the argument ssid causes buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda TX9 fast_setting_wifi_set sub_432580 buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:39:05.487Z

Reserved: 2026-02-06T21:02:55.976Z

Link: CVE-2026-2139

cve-icon Vulnrichment

Updated: 2026-02-10T19:55:54.152Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T07:15:59.507

Modified: 2026-02-10T19:29:09.960

Link: CVE-2026-2139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:30:45Z

Weaknesses