Description
A weakness has been identified in Tenda AC9 15.03.06.42_multi. Affected is the function formGetDdosDefenceList. This manipulation of the argument security.ddos.map causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-08
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote stack-based buffer overflow that can lead to code execution or denial of service
Action: Patch Now
AI Analysis

Impact

A flaw in the formGetDdosDefenceList function of Tenda AC9 firmware 15.03.06.42_multi allows an attacker to manipulate the security.ddos.map argument so that the target device’s stack buffer overflows. The vulnerability is a classic stack-based overflow identified by CWE-119 and CWE-121 and could corrupt control flow on the router. It can thus compromise router integrity, allow remote code execution, or crash the device, resulting in loss of availability for all local network traffic.

Affected Systems

Tenda manufactures the AC9 consumer router, and the specific firmware revision 15.03.06.42_multi is affected. Devices operating this firmware are susceptible to the overflow; no other Tenda models or firmware versions were listed as vulnerable in the available data.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity. Although the EPSS score is below 1%, the vulnerability is already in the public domain and documented exploits exist, so the likelihood of real-world use is non‑negligible. The remote attack vector implies that an external actor can send crafted traffic to the router to trigger the overflow, which could result in remote code execution or a denial‑of‑service if exploited.

Generated by OpenCVE AI on April 18, 2026 at 13:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the AC9 to a firmware version that resolves the formGetDdosDefenceList flaw
  • Disable or restrict remote access to the router’s management interface so that only trusted hosts can invoke the vulnerable API
  • Apply network‑level controls, such as firewall rules or VLAN segmentation, to isolate or block traffic to the vulnerable endpoint and monitor for malicious activity

Generated by OpenCVE AI on April 18, 2026 at 13:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:ac9_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac9 Firmware
CPEs cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac9_firmware:15.03.06.42_multi:*:*:*:*:*:*:*
Vendors & Products Tenda ac9 Firmware

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac9
Vendors & Products Tenda
Tenda ac9

Sun, 08 Feb 2026 22:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda AC9 15.03.06.42_multi. Affected is the function formGetDdosDefenceList. This manipulation of the argument security.ddos.map causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda AC9 formGetDdosDefenceList stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:50:50.691Z

Reserved: 2026-02-07T17:28:24.242Z

Link: CVE-2026-2191

cve-icon Vulnrichment

Updated: 2026-02-09T20:59:14.073Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T23:15:49.483

Modified: 2026-02-10T15:09:59.060

Link: CVE-2026-2191

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses