Description
A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by this issue is the function sub_4223E0 of the file /goform/setMacFilterCfg. Such manipulation of the argument deviceList leads to buffer overflow. The attack may be launched remotely. The exploit is publicly available and might be used.
Published: 2026-02-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential remote code execution
Action: Assess Impact
AI Analysis

Impact

The affected function sub_4223E0 in Tenda TX9's firmware handles a device list used to configure MAC filtering. An attacker can supply a crafted deviceList payload that exceeds the internal buffer, causing a stack‑based buffer overflow. This overflow could potentially allow remote code execution when the firmware processes the input, and the attack can be carried out remotely through the web management interface. The vulnerability is classified as CWE-119 and CWE-120.

Affected Systems

Devices manufactured by Tenda using the TX9 product line and running firmware versions up to 22.03.02.10_multi are vulnerable. The issue was reported for all builds of the TX9 firmware to that release, and no fixes have yet been released publicly; users should verify their firmware revision.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, but the EPSS score of less than 1% suggests a low probability of active exploitation. The vulnerability is not listed in the CISA KEV catalog, and the public exploit exists on GitHub. Based on the description, it is inferred that attackers can reach the vulnerable endpoint over the network without authentication, making the attack vector remote. Because the flaw occurs in buffer handling, successful exploitation would depend on reaching the firmware's management interface and sending a malformed payload. Overall, the risk is high severity with low to medium likelihood of exploitation at present.

Generated by OpenCVE AI on April 18, 2026 at 19:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Block or disable the /goform/setMacFilterCfg endpoint by configuring the device's firewall or restricting the management interface to trusted internal networks.
  • Apply network segmentation to isolate the TX9 from the public Internet and limit management access to known, trusted IP ranges.
  • Monitor the device for anomalous traffic or repeated exploitation attempts, and configure alerts for traffic targeting the vulnerable endpoint.

Generated by OpenCVE AI on April 18, 2026 at 19:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda tx9 Firmware
CPEs cpe:2.3:h:tenda:tx9:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:tx9_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda tx9 Firmware

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda tx9
Vendors & Products Tenda
Tenda tx9

Sun, 08 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by this issue is the function sub_4223E0 of the file /goform/setMacFilterCfg. Such manipulation of the argument deviceList leads to buffer overflow. The attack may be launched remotely. The exploit is publicly available and might be used.
Title Tenda TX9 setMacFilterCfg sub_4223E0 buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:39:20.844Z

Reserved: 2026-02-06T21:02:58.555Z

Link: CVE-2026-2140

cve-icon Vulnrichment

Updated: 2026-02-10T21:16:32.325Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T07:16:01.577

Modified: 2026-02-10T19:28:33.607

Link: CVE-2026-2140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:45:08Z

Weaknesses