Description
A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-21
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow occurs in the set_qosMib_list function of the /goform/formSetQosBand endpoint on the Tenda A21 Router (firmware 1.0.0.0). The flaw is triggered by manipulating the argument list supplied to this function, allowing an attacker to overflow a stack buffer and potentially execute arbitrary code. The vulnerability is exploitable over the network and has a publicly available exploit, making it a severe risk for any exposed device.

Affected Systems

The Tenda A21 router running firmware version 1.0.0.0 is affected. No other Tenda models or firmware versions are listed in the current data.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.7, indicating high severity. The EPSS score is less than 1%, suggesting low current exploitation probability, but the existence of a public exploit and the remote attack vector increase the potential threat. The flaw is not listed in the CISA KEV catalog, yet the combination of high impact and a remote trigger warrants prompt action.

Generated by OpenCVE AI on April 17, 2026 at 16:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tenda A21 router to the latest firmware release that contains a fix for the stack‑overflow in the QoS configuration interface.
  • If a firmware update is not yet available or feasible, block external access to the /goform/formSetQosBand endpoint using the router’s firewall or packet filtering rules, effectively disabling the vulnerable QoS function from remote interfaces.
  • Restrict remote management of the router to the internal network or disable remote management features entirely, limiting exposure of the vulnerable endpoint to trusted local users only.

Generated by OpenCVE AI on April 17, 2026 at 16:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda a21 Firmware
CPEs cpe:2.3:h:tenda:a21:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:a21_firmware:1.0.0.0:*:*:*:*:*:*:*
Vendors & Products Tenda a21 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda a21
Vendors & Products Tenda
Tenda a21

Sat, 21 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Title Tenda A21 formSetQosBand set_qosMib_list stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:37:36.449Z

Reserved: 2026-02-20T14:40:34.118Z

Link: CVE-2026-2870

cve-icon Vulnrichment

Updated: 2026-02-23T19:37:30.600Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T15:15:59.643

Modified: 2026-02-23T21:00:00.257

Link: CVE-2026-2870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses