Description
A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted element is the function sub_423B50 of the file /goform/setMacFilterCfg of the component MAC Filtering Configuration Endpoint. Executing a manipulation of the argument deviceList can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow was identified in the setMacFilterCfg endpoint of the MAC filtering feature on Tenda A18 Pro devices. The flaw originates from improper handling of the deviceList parameter in the sub_423B50 function, which can overwrite memory on the stack. If successfully triggered, this vulnerability allows a remote attacker to execute arbitrary code or cause a denial of service, compromising the device’s confidentiality, integrity, and availability. The weakness is classified under CWE-119 and CWE-121.

Affected Systems

The vulnerability affects the Tenda A18 Pro model running firmware version 02.03.02.28. No other firmware versions or models are listed as affected in the available data.

Risk and Exploitability

The CVSS score of 8.7 indicates a high-risk severity. Although EPSS data is not available, the vulnerability has been publicly disclosed and can be exploited remotely without authentication, which increases the likelihood of real-world attacks. The lack of inclusion in the KEV catalog does not diminish the risk, as attackers can already craft attacks targeting the exposed deviceList parameter. The threat is serious for any business or home environment relying on the described device.

Generated by OpenCVE AI on March 20, 2026 at 18:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the firmware version on your Tenda A18 Pro devices to confirm if 02.03.02.28 is installed.
  • Check Tenda’s official website or support portal for a firmware update that addresses the stack‑based buffer overflow.
  • Download and install the updated firmware on all affected units.
  • Restart the device and confirm the new firmware version is in place.
  • If no update is currently available, consider disabling the MAC filtering feature or placing the device in a separate network segment to mitigate exposure until a patch is released.

Generated by OpenCVE AI on March 20, 2026 at 18:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda a18 Pro
Vendors & Products Tenda
Tenda a18 Pro

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted element is the function sub_423B50 of the file /goform/setMacFilterCfg of the component MAC Filtering Configuration Endpoint. Executing a manipulation of the argument deviceList can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Title Tenda A18 Pro MAC Filtering Configuration Endpoint setMacFilterCfg sub_423B50 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T19:57:08.515Z

Reserved: 2026-03-20T08:32:52.804Z

Link: CVE-2026-4493

cve-icon Vulnrichment

Updated: 2026-03-20T19:57:04.148Z

cve-icon NVD

Status : Deferred

Published: 2026-03-20T18:16:17.597

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-4493

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:28:57Z

Weaknesses