Description
A security flaw has been discovered in Tenda AC8 16.03.50.11. This affects the function route_set_user_policy_rule of the file /cgi-bin/UploadCfg of the component Web Interface. The manipulation of the argument wans.policy.list1 results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-16
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Tenda AC8 router’s web interface allows an attacker to manipulate the wans.policy.list1 argument of the /cgi-bin/UploadCfg endpoint. The manipulation triggers an operating‑system command injection, which falls under CWE‑77 and CWE‑78 weaknesses. As a result, an attacker can execute arbitrary commands on the device, potentially leading to full system compromise.

Affected Systems

The vulnerability is confirmed in Tenda AC8 model firmware version 16.03.50.11, as referenced in the CPE list cpe:2.3:o:tenda:ac8_firmware:16.03.50.11.*. The CPE data also lists the generic Tenda AC8 5.0 product line, but only the 16.03.50.11 build is known to be affected per the provided description.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, while the EPSS score is below 1 %, and the issue is not in the CISA KEV catalog. The official description states that the attack can be launched remotely without authentication, and public proof‑of‑concept code is available, suggesting that exploitation is feasible and could occur from external networks. Based on the description, it is inferred that successful exploitation may grant an attacker complete control over the device’s configuration and operations.

Generated by OpenCVE AI on March 20, 2026 at 15:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Tenda website or support portal for a firmware update that addresses the command‑injection vulnerability and install the latest release as soon as possible.
  • If a patch is not immediately available, block external access to the router’s web management interface by configuring firewall rules or disabling remote management features.
  • Apply network‑level restrictions to ensure that only trusted IP addresses can reach the router’s administrative ports.
  • Monitor the router’s access logs for suspicious requests to /cgi-bin/UploadCfg and set alerts for abnormal input patterns.

Generated by OpenCVE AI on March 20, 2026 at 15:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:ac8:5.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac8_firmware:16.03.50.11:*:*:*:*:*:*:*

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac8
Vendors & Products Tenda ac8

Mon, 16 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda AC8 16.03.50.11. This affects the function route_set_user_policy_rule of the file /cgi-bin/UploadCfg of the component Web Interface. The manipulation of the argument wans.policy.list1 results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.
Title Tenda AC8 Web UploadCfg route_set_user_policy_rule os command injection
First Time appeared Tenda
Tenda ac8 Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:tenda:ac8_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac8 Firmware
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T18:01:14.327Z

Reserved: 2026-03-16T06:16:07.224Z

Link: CVE-2026-4253

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T18:16:10.540

Modified: 2026-03-20T12:55:36.280

Link: CVE-2026-4253

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:50:10Z

Weaknesses