Description
A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-23
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A vulnerability exists in the UploadCfg function of the Tenda A15 router firmware 15.13.07.13. The function improperly handles the File argument, leading to a stack-based buffer overflow that can be triggered remotely. This flaw corresponds to CWE-119 and CWE-121 and can allow an attacker to execute arbitrary code on the device, potentially taking full control of the router. The description confirms the overflow is exploitable from outside the local network and that an exploit has already been disclosed to the public.

Affected Systems

The issue affects the Tenda A15 wireless router running firmware version 15.13.07.13. The Common Platform Enumeration identifies the hardware as tenda:a15 and the firmware as tenda:a15_firmware:15.13.07.13. No other versions are listed, so the risk is specific to this build.

Risk and Exploitability

The CVSS score of 9.3 places this flaw in the Critical severity range. While the EPSS indicates a low probability of exploitation (less than 1%), the vulnerability is publicly disclosed and can be harnessed from remote clients. It is not present in the CISA Known Exploited Vulnerabilities catalog. Because the flaw resides in a remote-accessible CGI interface, a threat actor with external network reach could launch the attack without requiring prior login credentials. The high severity and publicly available exploit code mean a rapid response is warranted.

Generated by OpenCVE AI on April 2, 2026 at 13:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest version released by Tenda. If a newer firmware is not immediately available, avoid using the /cgi-bin/UploadCfg service by disabling or removing it from the firmware configuration. Keep the device isolated from untrusted networks and restrict management access only to trusted internal parties. Change the default administrator username and password to strong, unique credentials. Regularly monitor router logs for suspicious upload requests or abnormal POST traffic.

Generated by OpenCVE AI on April 2, 2026 at 13:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:*

Mon, 23 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda a15
Vendors & Products Tenda a15

Mon, 23 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Tenda A15 UploadCfg stack-based overflow
First Time appeared Tenda
Tenda a15 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:a15_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda a15 Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T11:49:07.827Z

Reserved: 2026-03-22T08:34:10.518Z

Link: CVE-2026-4567

cve-icon Vulnrichment

Updated: 2026-03-23T11:48:52.076Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T03:16:00.387

Modified: 2026-04-02T12:11:41.987

Link: CVE-2026-4567

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:23:13Z

Weaknesses