Description
A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Published: 2026-02-21
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via stack-based buffer overflow
Action: Apply Update
AI Analysis

Impact

The vulnerability allows an attacker to manipulate the schedStartTime and schedEndTime parameters used by the setSchedWifi function on the Tenda A21 router. This causes a stack-based buffer overflow, which can be chained to execute arbitrary code and compromise the device entirely. The CVSS score of 8.7 indicates a high level of severity, and the public exploit can be delivered remotely by sending specially crafted requests.

Affected Systems

Tenda A21 routers running firmware version 1.0.0.0. The flaw resides in the /goform/openSchedWifi endpoint of the device’s web interface.

Risk and Exploitability

Because the attack vector is remote, an adversary can reach the vulnerable endpoint from outside the local network. EPSS indicates a very low current exploitation probability, but the flaw is already publicly available and not listed in the CISA KEV catalog. If a patch is not applied, the risk of successful exploitation remains high, leading to full device compromise.

Generated by OpenCVE AI on April 17, 2026 at 16:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and flash the latest firmware version from Tenda’s official website that contains the fix for this buffer overflow.
  • Restrict access to the router’s management interface by enabling firewall rules that limit the openSchedWifi API to trusted internal IP addresses only.
  • Monitor the router’s system and access logs for abnormal requests to /goform/openSchedWifi and premature termination of services, and correlate with any detected packet anomalies.

Generated by OpenCVE AI on April 17, 2026 at 16:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda a21 Firmware
CPEs cpe:2.3:h:tenda:a21:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:a21_firmware:1.0.0.0:*:*:*:*:*:*:*
Vendors & Products Tenda a21 Firmware

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda a21
Vendors & Products Tenda
Tenda a21

Sat, 21 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Title Tenda A21 openSchedWifi setSchedWifi stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:24:56.776Z

Reserved: 2026-02-20T14:40:48.908Z

Link: CVE-2026-2873

cve-icon Vulnrichment

Updated: 2026-02-23T19:24:49.120Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T17:15:58.987

Modified: 2026-02-23T20:56:58.853

Link: CVE-2026-2873

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses