Description
A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function formSetQosBand of the file /goform/SetNetControlList. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Published: 2026-03-23
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The documented flaw is a buffer overflow in the formSetQosBand handler within the /goform/SetNetControlList interface of the Tenda AC21. By supplying an overly long or carefully structured argument list, an attacker can corrupt the stack on the device, potentially allowing arbitrary memory write and execution of malicious code. Because the handler can be invoked remotely, the attacker does not need prior authentication; the vulnerability is exploitable over the public network and is known to be actively used.

Affected Systems

The flaw affects all Tenda AC21 routers running firmware version 16.03.08.16, as identified in the product’s CPE entries. No older versions are explicitly listed, but the same implementation of formSetQosBand likely exists in firmware builds released around that time. Administrators should verify their device’s current firmware version against the vendor’s catalog to determine exposure.

Risk and Exploitability

The advisory assigns a CVSS score of 8.7, indicating high severity, while the EPSS score is below 1 %, suggesting a low average likelihood of detection but not ruling out opportunistic exploitation. The vulnerability is not yet included in CISA’s KEV catalog, meaning active exploitation in the wild is not formally documented, yet proof‑of‑concept exploits are publicly available, underscoring the need for timely mitigation.

Generated by OpenCVE AI on April 3, 2026 at 13:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest firmware version released by Tenda that resolves the buffer overflow in formSetQosBand.
  • If no updated firmware is available, disable the QoS functionality or restrict access to the /goform/SetNetControlList endpoint to limit exposure.
  • Monitor the router for unusual QoS configuration activity or attempts to write beyond buffer limits, and log all remote management attempts.

Generated by OpenCVE AI on April 3, 2026 at 13:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 11:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:ac21:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac21_firmware:16.03.08.16:*:*:*:*:*:*:*

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac21
Vendors & Products Tenda ac21

Mon, 23 Mar 2026 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function formSetQosBand of the file /goform/SetNetControlList. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Title Tenda AC21 SetNetControlList formSetQosBand buffer overflow
First Time appeared Tenda
Tenda ac21 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:ac21_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac21 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ac21 Ac21 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T16:39:11.312Z

Reserved: 2026-03-22T08:29:00.489Z

Link: CVE-2026-4565

cve-icon Vulnrichment

Updated: 2026-03-23T16:15:27.517Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T01:16:43.803

Modified: 2026-04-03T11:31:50.243

Link: CVE-2026-4565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:18:11Z

Weaknesses