Description
A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-23
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the Tenda AC8 router’s Httpd service within the webCgiGetUploadFile function of the /cgi-bin/UploadCfg endpoint. The CVE description notes that malformed input can corrupt the stack, and that the vulnerability can be triggered remotely. The specific consequences are not explicitly detailed, but the nature of the overflow suggests that the attacker might be able to execute code on the device. Based on typical outcomes of such bugs, it is inferred that the flaw could potentially enable remote execution of arbitrary commands, though the CVE itself does not state this overtly.

Affected Systems

Devices affected are Tenda AC8 routers running firmware version 16.03.34.06. The vulnerability is specific to the Httpd service in that firmware build; no other firmware versions are explicitly mentioned in the CNA data.

Risk and Exploitability

The CVSS score of 8.7 indicates a high potential impact, and publicly disclosed exploits confirm that the vulnerability is actionable from a remote source. The EPSS score is less than 1 %, implying that the likelihood of exploitation is currently low, but the threat remains because the flaw can be leveraged over the Internet. The specific exploit outcome is not explicitly documented, but given the nature of the stack-based overflow, it is inferred that a successful exploit could lead to remote code execution. The vulnerability is not listed in the CISA KEV catalog, yet administrators should prioritize mitigating it, especially on devices exposed to external networks.

Generated by OpenCVE AI on April 18, 2026 at 11:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device to the latest firmware release from Tenda that contains a fix for the buffer overflow in the Httpd service.
  • If an updated firmware is not available, block external HTTP access to the router’s web administration interface or specifically deny requests to /cgi-bin/UploadCfg using firewall rules or router ACLs.
  • Regularly review system logs for abnormal upload activity and isolate the router’s management network so that only trusted internal hosts can reach its administrative interface.

Generated by OpenCVE AI on April 18, 2026 at 11:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac8
Vendors & Products Tenda ac8

Mon, 23 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title Tenda AC8 Httpd Service UploadCfg webCgiGetUploadFile stack-based overflow
First Time appeared Tenda
Tenda ac8 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ac8_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac8 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T16:13:27.828Z

Reserved: 2026-02-23T16:49:41.677Z

Link: CVE-2026-3044

cve-icon Vulnrichment

Updated: 2026-02-25T16:13:18.768Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T00:16:19.420

Modified: 2026-02-24T21:39:12.990

Link: CVE-2026-3044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses