Description
A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_loid_password causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow (CWE‑121) triggered by manipulating the fmgpon_loid or fmgpon_loid_password argument on the /boaform/formgponConf endpoint. It also involves improper handling of input buffers (CWE‑119). The flaw allows an attacker to overwrite return addresses on the stack, which can lead to arbitrary code execution on the device. As remote exploitation is possible, the impact includes full compromise of the device’s confidentiality, integrity, and availability.

Affected Systems

The flaw affects Tenda HG9 routers running firmware version 300001138, and the impact likely extends to earlier firmware versions that contain the same vulnerable component, though this is an inference. The product is commonly deployed in residential and small office environments.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity vulnerability. However, the EPSS score is less than 1%, implying a low likelihood of exploitation at the current time, and the vulnerability has not yet been listed in the CISA KEV catalog. The likely attack vector is remote, as the /boaform/formgponConf endpoint is exposed over HTTP/HTTPS. Publicly available exploit code reduces the barrier to exploitation for attackers willing to target vulnerable devices.

Generated by OpenCVE AI on April 18, 2026 at 19:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version that resolves the buffer overflow.
  • If an update is not yet available, lock down the GPON configuration web interface by configuring firewall rules or disabling it in the device settings.
  • Apply input validation measures, such as configuring the device to reject overly long or malformed parameters for fmgpon_loid_password.
  • Monitor for abnormal traffic targeting /boaform/formgponConf and block repeated attempts.

Generated by OpenCVE AI on April 18, 2026 at 19:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda hg9 Firmware
CPEs cpe:2.3:h:tenda:hg9:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:hg9_firmware:300001138:*:*:*:*:*:*:*
Vendors & Products Tenda hg9 Firmware

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda hg9
Vendors & Products Tenda
Tenda hg9

Sun, 22 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_loid_password causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Title Tenda HG9 GPON Configuration Endpoint formgponConf stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:23:03.755Z

Reserved: 2026-02-20T20:14:43.142Z

Link: CVE-2026-2907

cve-icon Vulnrichment

Updated: 2026-02-23T19:22:57.296Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T02:16:57.703

Modified: 2026-02-23T20:21:53.467

Link: CVE-2026-2907

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:45:08Z

Weaknesses