Description
A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument Ethtype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

A stack-based buffer overflow is triggered when an attacker supplies a crafted Ethtype argument to the /boaform/formLoopBack endpoint on Tenda HG9 routers running firmware 300001138. This overflow occurs in the loopback detection configuration component and may overwrite the stack. Based on the description, it is inferred that the attacker could gain arbitrary code execution, potentially taking full control of the device. The flaw represents a classic stack corruption weakness described by CWE-119 and CWE-121.

Affected Systems

The affected product is the Tenda HG9 router model HG9, firmware version 300001138. No other models or firmware revisions are explicitly listed as vulnerable in the CNA data.

Risk and Exploitability

The CVSS base score of 8.7 classifies this vulnerability as high severity, while the EPSS score of less than 1% indicates a low current exploitation probability. The vulnerability is not included in the CISA KEV catalog. The likely attack vector is remote: an adversary can send a malicious Ethtype value to the formLoopBack endpoint over the network. Once triggered, the stack corruption can lead to arbitrary code execution, giving the attacker full device compromise. This danger is inferred from the stack-based nature of the overflow.

Generated by OpenCVE AI on April 18, 2026 at 17:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware release from Tenda that addresses the formLoopBack buffer overflow.
  • If a patched firmware is not yet available, restrict or block remote access to the /boaform/formLoopBack endpoint via firewall rules or limiting management interface exposure to trusted networks.
  • Monitor device logs for attempts to supply oversized Ethtype values and investigate suspicious activity.

Generated by OpenCVE AI on April 18, 2026 at 17:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda hg9 Firmware
CPEs cpe:2.3:h:tenda:hg9:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:hg9_firmware:300001138:*:*:*:*:*:*:*
Vendors & Products Tenda hg9 Firmware

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda hg9
Vendors & Products Tenda
Tenda hg9

Sun, 22 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument Ethtype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Title Tenda HG9 Loopback Detection Configuration Endpoint formLoopBack stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:19:51.049Z

Reserved: 2026-02-20T20:14:45.983Z

Link: CVE-2026-2908

cve-icon Vulnrichment

Updated: 2026-02-23T19:19:41.950Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T02:16:57.890

Modified: 2026-02-23T20:21:45.490

Link: CVE-2026-2908

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:00:06Z

Weaknesses