Description
A weakness has been identified in Tenda AC21 16.03.08.16. This impacts an unknown function of the file /cgi-bin/DownloadLog of the component Web Management Interface. Executing a manipulation can lead to information disclosure. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Remote Web Interface
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the /cgi-bin/DownloadLog endpoint of the web management interface on the Tenda AC21 router. By manipulating input parameters, an attacker can read sensitive logs sent back in the HTTP response, disclosing configuration and traffic data and compromising confidentiality. This flaw aligns with authorization and information disclosure weaknesses.

Affected Systems

Affected products include Tenda AC21 routers running firmware version 16.03.08.16 and prior releases that contain the same web interface component. No other models or firmware revisions are currently identified as vulnerable.

Risk and Exploitability

The CVSS base score of 6.9 indicates moderate severity, while the EPSS score of less than 1% signals a very low probability of exploitation in the wild. The flaw is remotely exploitable from any network that can reach the router’s web interface, and the publicly released exploit demonstrates that attackers can use it without additional prerequisites. The vulnerability is not listed in CISA’s KEV catalog, suggesting no confirmed widespread exploitation to date.

Generated by OpenCVE AI on April 17, 2026 at 21:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest release that fixes the /cgi-bin/DownloadLog handling.
  • Disable the web management interface or restrict it to a trusted IP address range using the device’s access‑control features.
  • Apply a firewall rule or network segmentation to block direct external access to the router’s management interface.

Generated by OpenCVE AI on April 17, 2026 at 21:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:ac21_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac21 Firmware
CPEs cpe:2.3:h:tenda:ac21:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac21_firmware:16.03.08.16:*:*:*:*:*:*:*
Vendors & Products Tenda ac21 Firmware

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac21
Vendors & Products Tenda
Tenda ac21

Sun, 08 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda AC21 16.03.08.16. This impacts an unknown function of the file /cgi-bin/DownloadLog of the component Web Management Interface. Executing a manipulation can lead to information disclosure. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Title Tenda AC21 Web Management DownloadLog information disclosure
Weaknesses CWE-200
CWE-284
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ac21 Ac21 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:40:42.795Z

Reserved: 2026-02-07T07:51:35.170Z

Link: CVE-2026-2147

cve-icon Vulnrichment

Updated: 2026-02-10T21:20:14.348Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T10:15:50.673

Modified: 2026-02-10T18:53:43.723

Link: CVE-2026-2147

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:00:11Z

Weaknesses