Description
A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation results in stack-based buffer overflow. The attack may be launched remotely. The exploit is now public and may be used.
Published: 2026-03-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow occurs in the form_fast_setting_wifi_set function of the /goform/fast_setting_wifi_set interface. This flaw allows a remote attacker to send crafted data to the device and overwrite control data on the stack, potentially enabling arbitrary code execution. The vulnerability is classified as CWE‑119 and CWE‑121.

Affected Systems

The Tenda A18 Pro model, specifically firmware version 02.03.02.28, is affected. No other versions or products are listed as impacted.

Risk and Exploitability

The CVSS score is 8.7, indicating high severity. EPSS information is not available, and the vulnerability is not listed in CISA’s KEV catalog. The flaw is exploitable remotely and a public exploit has already been disclosed, making the risk of exploitation significant for devices running the affected firmware.

Generated by OpenCVE AI on March 20, 2026 at 17:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for the Tenda A18 Pro (any release newer than 02.03.02.28).
  • If an update is not yet available, temporarily disable remote access to the /goform/fast_setting_wifi_set interface or block the device on the network.
  • Monitor device logs for anomalous activity and isolate the device until a patch is applied.

Generated by OpenCVE AI on March 20, 2026 at 17:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda a18 Pro
Vendors & Products Tenda
Tenda a18 Pro

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation results in stack-based buffer overflow. The attack may be launched remotely. The exploit is now public and may be used.
Title Tenda A18 Pro fast_setting_wifi_set form_fast_setting_wifi_set stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T17:13:09.636Z

Reserved: 2026-03-20T08:32:36.191Z

Link: CVE-2026-4489

cve-icon Vulnrichment

Updated: 2026-03-20T17:13:03.771Z

cve-icon NVD

Status : Deferred

Published: 2026-03-20T16:16:19.303

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-4489

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:29:14Z

Weaknesses