Description
A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-21
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Stack-based buffer overflow enabling remote code execution
Action: Apply patch
AI Analysis

Impact

A stack-based buffer overflow exists in the Httpd Service of Tenda A18, triggered by the strcpy operation on the wpapsk_crypto5g argument within the WifiExtraSet function. The flaw allows a remote attacker to corrupt the stack, which could lead to arbitrary code execution or denial of service. The weakness is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Buffer) and CWE-121 (Stack-based Buffer Overflow).

Affected Systems

The vulnerability affects the Tenda A18 router model running firmware version 15.13.07.13. The hardware and its associated firmware are impacted.

Risk and Exploitability

The CVSS base score of 8.7 reflects high severity, while the EPSS score of less than 1% signals a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread known exploitation. The attack vector is remote, accessed via the Httpd Service, requiring the ability to send crafted parameters to the /goform/WifiExtraSet endpoint. Based on the description, it is inferred that the attacker does not need administrative credentials to trigger the flaw.

Generated by OpenCVE AI on April 18, 2026 at 11:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest Tenda firmware that contains a fix for the stack overflow; if no update is available, contact Tenda support for guidance.
  • Configure the router’s firewall or network ACL to block HTTP requests containing the wpapsk_crypto5g parameter or to the /goform/WifiExtraSet URL, effectively disabling the vulnerable function.
  • Restrict management access to the router’s administrative interface to the local network only, and disable remote administration features if they are enabled.
  • Monitor system logs for repeated attempts to reach /goform/WifiExtraSet and alert on suspicious activity.

Generated by OpenCVE AI on April 18, 2026 at 11:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda a18 Firmware
CPEs cpe:2.3:h:tenda:a18:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:a18_firmware:15.13.07.13:*:*:*:*:*:*:*
Vendors & Products Tenda a18 Firmware

Mon, 23 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda a18
Vendors & Products Tenda
Tenda a18

Sat, 21 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title Tenda A18 Httpd Service WifiExtraSet strcpy stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T15:40:18.876Z

Reserved: 2026-02-20T16:13:16.150Z

Link: CVE-2026-2877

cve-icon Vulnrichment

Updated: 2026-02-23T15:40:11.273Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T19:15:58.940

Modified: 2026-02-23T20:09:24.240

Link: CVE-2026-2877

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:30:44Z

Weaknesses