Description
An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of `gstup` and `gstdwn` before concatenating them into `gstruleQos` may lead to buffer overflow.
Published: 2026-03-02
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Buffer overflow that can lead to remote code execution
Action: Immediate Patch
AI Analysis

Impact

An attacker can exploit a buffer overflow in the Tenda W20E V4.0 firmware because the sizes of the gstup and gstdwn fields are not validated before they are concatenated into the gstruleQos string. When oversized data is supplied, the concatenation overruns the allocated buffer, corrupting neighbouring memory. This memory corruption can allow the attacker to execute arbitrary code or crash the device, compromising confidentiality, integrity and availability. The weakness is a classic instance of CWE‑120: Buffer Copy without Checking Size of Destination Buffer.

Affected Systems

The vulnerability exists in Tenda W20E routers running firmware version V4.0br_V15.11.0.6. Devices that have not been updated to later firmware releases that contain the patch are at risk. The affected product family is Tenda W20E, a consumer‑grade wireless router, as identified by the CPE entries for the hardware and firmware.

Risk and Exploitability

The CVSS score of 9.8 classifies this flaw as critical, indicating high exploitation potential if the conditions are met. The EPSS score of less than 1% suggests that the prevalence of exploit activity is currently low, but the criticality of the flaw warrants prompt action. The flaw is not listed in CISA’s KEV catalog, so no known active exploits have been reported to date. Although the CVE description does not specify the exact attack vector, the involved parameters are normally accepted over the device’s web‑based management interface, implying the likely vector is a remote network connection that can send crafted gstup and gstdwn values.

Generated by OpenCVE AI on April 16, 2026 at 14:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update that patches the buffer‑overflow bug on the Tenda W20E.
  • Reduce the attack surface by disabling or restricting remote management access on the router; limit configuration changes to a trusted local network or VPN.
  • Continuously monitor system logs for anomalous activity such as repeated configuration change attempts or unexpected crashes, and enforce network segmentation to isolate the router from critical infrastructure.

Generated by OpenCVE AI on April 16, 2026 at 14:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in Tenda W20E Firmware via Improper Size Validation

Tue, 03 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w20e
Tenda w20e Firmware
Weaknesses CWE-120
CPEs cpe:2.3:h:tenda:w20e:4.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda w20e
Tenda w20e Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 02 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of `gstup` and `gstdwn` before concatenating them into `gstruleQos` may lead to buffer overflow.
References

Subscriptions

Tenda W20e W20e Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-03T20:35:56.228Z

Reserved: 2026-01-21T00:00:00.000Z

Link: CVE-2026-24115

cve-icon Vulnrichment

Updated: 2026-03-03T20:35:49.596Z

cve-icon NVD

Status : Modified

Published: 2026-03-02T15:16:33.977

Modified: 2026-03-03T21:15:58.057

Link: CVE-2026-24115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:00:14Z

Weaknesses