Description
A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service. This manipulation of the argument timeZone causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Published: 2026-02-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the Embedded Httpd Service of the Tenda AC8 router. The vulnerability is triggered when the timeZone argument in the /goform/fast_setting_wifi_set endpoint is supplied with an overly long payload, allowing an attacker to execute arbitrary code on the device, compromising confidentiality, integrity, and availability.

Affected Systems

The flaw affects Tenda AC8 routers running firmware version 16.03.33.05. The specific endpoint /goform/fast_setting_wifi_set is responsible for the error.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity vulnerability, allowing remote attackers to exploit it via standard HTTP requests. The current EPSS score of less than 1% suggests a low probability of real‑world exploitation, although an exploit has already been published and may be available for use. The vulnerability is not listed in the CISA KEV catalog, but administrators should still consider it a high‑risk issue.

Generated by OpenCVE AI on April 17, 2026 at 21:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest version that addresses the buffer overflow in the /goform/fast_setting_wifi_set endpoint.
  • Restrict remote management by configuring the router to accept administrator requests only from trusted local addresses or over VPN.
  • If a firmware update is not immediately available, block or disable the /goform/fast_setting_wifi_set endpoint using the router's firewall or disabling the Embedded Httpd Service entirely.

Generated by OpenCVE AI on April 17, 2026 at 21:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:ac8_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac8 Firmware
CPEs cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac8_firmware:16.03.33.05:*:*:*:*:*:*:*
Vendors & Products Tenda ac8 Firmware

Mon, 09 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac8
Vendors & Products Tenda
Tenda ac8

Mon, 09 Feb 2026 02:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service. This manipulation of the argument timeZone causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Title Tenda AC8 Embedded Httpd Service fast_setting_wifi_set buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:53:42.927Z

Reserved: 2026-02-07T17:49:22.158Z

Link: CVE-2026-2203

cve-icon Vulnrichment

Updated: 2026-02-09T16:37:54.913Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T03:16:13.790

Modified: 2026-02-10T15:07:15.440

Link: CVE-2026-2203

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses