Description
A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-21
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Tenda A21 router firmware 1.0.0.0 contains a stack-based buffer overflow in the fromSetIpMacBind function invoked through the /goform/SetIpMacBind endpoint. A malicious actor can send a crafted request to overflow the buffer and overwrite return addresses, leading to arbitrary code execution on the device. This flaw constitutes a remote code execution vulnerability that can compromise confidentiality, integrity, and availability of the router and any devices connected to it. The weakness is typified by CWE‑119 and CWE‑121.

Affected Systems

Affected product is the Tenda A21 model running firmware version 1.0.0.0. The vulnerability specifically targets the SetIpMacBind functionality within this firmware.

Risk and Exploitability

The flaw receives a CVSS score of 8.7, indicating high severity, while the EPSS score is below 1 %, suggesting limited current exploitation activity but the public availability of exploits means attackers could still target vulnerable devices. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, but the capability for remote exploitation via a web request makes it a critical risk for administrators who have not applied a patch or disabled the vulnerable feature. A successful exploit would allow an attacker to run arbitrary code on the device, potentially bypassing network controls and accessing connected resources.

Generated by OpenCVE AI on April 17, 2026 at 16:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Tenda firmware update that addresses the SetIpMacBind overflow.
  • If an update is not yet available, block or restrict access to the /goform/SetIpMacBind endpoint or disable the IP‑MAC binding feature in router settings.
  • Continuously monitor router logs and network traffic for attempts to exploit the SetIpMacBind interface and verify that no unpatched devices remain on the network.

Generated by OpenCVE AI on April 17, 2026 at 16:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda a21 Firmware
CPEs cpe:2.3:h:tenda:a21:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:a21_firmware:1.0.0.0:*:*:*:*:*:*:*
Vendors & Products Tenda a21 Firmware

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda a21
Vendors & Products Tenda
Tenda a21

Sat, 21 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda A21 SetIpMacBind fromSetIpMacBind stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:38:22.083Z

Reserved: 2026-02-20T14:40:42.148Z

Link: CVE-2026-2871

cve-icon Vulnrichment

Updated: 2026-02-23T19:38:15.304Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T16:16:05.133

Modified: 2026-02-23T20:59:13.240

Link: CVE-2026-2871

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses