Description
An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`.
Published: 2026-03-02
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Buffer overflow that may enable remote code execution
Action: Patch firmware
AI Analysis

Impact

An OS buffer overflow vulnerability exists in the Tenda W20E model, firmware V4.0br, specifically at firmware build 15.11.0.6. The flaw arises because the parameter pPortMapIndex is not validated before being copied into a fixed-size buffer with strcpy, a classic out‑of‑bounds memory write. This weakness permits an attacker who can supply malformed input to overwrite adjacent memory, potentially causing a crash or executing arbitrary code on the device. The vulnerability is coded as CWE‑120, reflecting an unsafe string handling operation. The impact is the loss of data integrity and confidentiality, with the possibility of remote code execution if the attacker controls the input source.

Affected Systems

The affected device is the Tenda W20E router, running firmware V4.0br, build 15.11.0.6. No other vendors or product versions are specified. Consequently, only deployments of this exact router model and firmware version are directly susceptible to the flaw.

Risk and Exploitability

The vulnerability carries a CVSS v3 base score of 7.5, indicating high severity. EPSS indicates an exploitation probability of less than 1 %. The flaw is not listed in CISA’s KEV catalog, suggesting that known exploits are scarce or have not been observed in the wild. Based on the description, the likely attack vector is remote, via the router’s web management interface or API that accepts the pPortMapIndex parameter. An attacker would need to send a crafted input longer than the buffer, which may be achievable through a simple HTTP request. The lack of an official patch or workaround is noted; therefore, the risk remains high until a firmware update becomes available.

Generated by OpenCVE AI on April 16, 2026 at 14:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a firmware update from Tenda that addresses the pPortMapIndex validation flaw, ensuring the device runs a version later than 15.11.0.6.
  • If an update is not immediately available, disable or restrict any features that invoke port mapping functionality, such as port forwarding, on the router through the management interface.
  • Actively monitor the device’s logs for anomalous HTTP requests containing oversized parameters, and block any source IPs that repeatedly attempt to send such payloads.

Generated by OpenCVE AI on April 16, 2026 at 14:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow via Unvalidated Port Mapping Index in Tenda W20E Firmware

Tue, 03 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Tue, 03 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w20e
Tenda w20e Firmware
Weaknesses CWE-120
CPEs cpe:2.3:h:tenda:w20e:4.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda w20e
Tenda w20e Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 02 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`.
References

Subscriptions

Tenda W20e W20e Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-03T20:09:41.101Z

Reserved: 2026-01-21T00:00:00.000Z

Link: CVE-2026-24114

cve-icon Vulnrichment

Updated: 2026-03-03T20:09:37.201Z

cve-icon NVD

Status : Modified

Published: 2026-03-02T15:16:33.810

Modified: 2026-03-03T20:16:47.607

Link: CVE-2026-24114

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:00:14Z

Weaknesses