Description
A security vulnerability has been detected in Tenda AC9 15.03.06.42_multi. Affected by this vulnerability is the function formGetRebootTimer. Such manipulation of the argument sys.schedulereboot.start_time/sys.schedulereboot.end_time leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-02-08
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

A stack-based buffer overflow occurs in the formGetRebootTimer function when attackers manipulate the sys.schedulereboot.start_time and sys.schedulereboot.end_time parameters. This flaw allows an attacker to corrupt the stack on the device and execute arbitrary code, potentially compromising the firmware and all data processed by the router. The escalation can result in loss of confidentiality, integrity, and availability, and is classified as CWE-119 (Buffer Overflow) and CWE-121 (Stack Smashing).

Affected Systems

The vulnerability affects Tenda AC9 routers with firmware version 15.03.06.42_multi (also listed as 5.03.06.42_multi). These appliances provide wireless and wired networking functions for small to medium sized environments.

Risk and Exploitability

The CVSS score of 8.6 indicates high severity, while the EPSS probability of less than 1 percent suggests low exploitation frequency at present. It is not included in CISA’s KEV catalog. Because the attack can be launched remotely through the router’s web interface, any network connected to the router is a potential attack surface. An attacker who succeeds can gain control of the device or perform a denial‑of‑service by exhausting stack space. No user intervention is required beyond remote access to the device’s configuration interface.

Generated by OpenCVE AI on April 17, 2026 at 21:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that fixes the formGetRebootTimer buffer overflow.
  • Restrict or disable remote access to the router’s web configuration interface, or limit it to trusted IP subnets.
  • Configure network segmentation or firewalls to block unsolicited traffic to the router’s management ports, reducing the opportunity for remote exploitation.

Generated by OpenCVE AI on April 17, 2026 at 21:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:ac9_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac9 Firmware
CPEs cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac9_firmware:5.03.06.42_multi:*:*:*:*:*:*:*
Vendors & Products Tenda ac9 Firmware

Mon, 09 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac9
Vendors & Products Tenda
Tenda ac9

Sun, 08 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda AC9 15.03.06.42_multi. Affected by this vulnerability is the function formGetRebootTimer. Such manipulation of the argument sys.schedulereboot.start_time/sys.schedulereboot.end_time leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Title Tenda AC9 formGetRebootTimer stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:51:06.600Z

Reserved: 2026-02-07T17:28:28.567Z

Link: CVE-2026-2192

cve-icon Vulnrichment

Updated: 2026-02-09T16:44:53.400Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T23:15:49.663

Modified: 2026-02-10T15:09:48.640

Link: CVE-2026-2192

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses