Description
A vulnerability was identified in Tenda A18 15.13.07.13. The affected element is the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. Such manipulation of the argument boundary leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
Published: 2026-02-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the webCgiGetUploadFile function of the /cgi-bin/UploadCfg endpoint of the Tenda A18 Httpd Service. By manipulating the boundary of an argument, an attacker can overflow a stack buffer, which can lead to arbitrary code execution. The vulnerability is classified as a buffer overflow (CWE‑119) and a stack overflow (CWE‑121). The public exploit indicates that an attacker can trigger this flaw remotely and execute code with the privileges of the web server process, thereby compromising confidentiality, integrity, and availability of the device.

Affected Systems

The affected product is the Tenda A18 router, firmware version 15.13.07.13. No other models or firmware revisions are listed as impacted.

Risk and Exploitability

The CVSS score of 5.3 suggests moderate severity. The EPSS score of less than 1 % indicates a low current likelihood of exploitation, and it is not listed in the CISA KEV catalog. The flaw can be exploited remotely via the HTTP service without authentication, so the attack vector is inferred to be the network layer, targeting the router’s upload configuration interface. Because the exploit is publicly available, it may be used in the wild, especially against devices with default or weak credentials.

Generated by OpenCVE AI on April 17, 2026 at 16:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tenda A18 firmware to a version that includes the patch for the /cgi-bin/UploadCfg buffer overflow.
  • Restrict access to the router’s HTTP administration interface to trusted internal hosts only, and disable or remove the UploadCfg endpoint if it is not required.
  • Implement firewall rules or access control lists to block external requests to the /cgi-bin/UploadCfg path until a non‑vulnerable firmware is deployed.
  • Check the vendor's website for available firmware updates or patches.

Generated by OpenCVE AI on April 17, 2026 at 16:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda a18 Firmware
CPEs cpe:2.3:h:tenda:a18:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:a18_firmware:15.13.07.13:*:*:*:*:*:*:*
Vendors & Products Tenda a18 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda a18
Vendors & Products Tenda
Tenda a18

Sun, 22 Feb 2026 06:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda A18 15.13.07.13. The affected element is the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. Such manipulation of the argument boundary leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
Title Tenda A18 Httpd Service UploadCfg webCgiGetUploadFile stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:14:49.138Z

Reserved: 2026-02-21T05:00:32.389Z

Link: CVE-2026-2930

cve-icon Vulnrichment

Updated: 2026-02-27T18:14:45.255Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T07:16:15.023

Modified: 2026-02-23T20:19:16.723

Link: CVE-2026-2930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses