Description
A flaw has been found in Tenda AC7 15.03.06.44. Affected by this issue is the function fromSetSysTime of the file /goform/SetSysTimeCfg of the component POST Request Handler. Executing a manipulation of the argument Time can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.
Published: 2026-03-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via stack-based buffer overflow triggered by a manipulated POST request
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the function that processes POST requests to the SetSysTimeCfg endpoint. By sending a crafted Time argument, an attacker can corrupt the stack, potentially leading to arbitrary code execution or a denial‑of‑service condition. The vulnerability is rated CVSS 8.7, indicating a high severity.

Affected Systems

Tenda AC7 routers running firmware version 15.03.06.44 are affected. The flaw resides in the router’s web‑based configuration interface, which is exposed on the local network and, if reachable from the internet, can be contacted remotely.

Risk and Exploitability

The EPSS score indicates a very low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Nonetheless, the attack vector is remote over the network through a standard HTTP POST request to /goform/SetSysTimeCfg, and exploit code has been published. The combination of a high CVSS score and low EPSS suggests a moderate overall risk that warrants prompt mitigation.

Generated by OpenCVE AI on March 30, 2026 at 20:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official firmware update that addresses the buffer overflow (or upgrade to a later firmware version).
  • Verify the integrity of the new firmware before applying it.
  • If an update is not yet available, block or restrict access to the /goform/SetSysTimeCfg endpoint via firewall rules or router access controls.

Generated by OpenCVE AI on March 30, 2026 at 20:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:ac7:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac7
Vendors & Products Tenda ac7

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda AC7 15.03.06.44. Affected by this issue is the function fromSetSysTime of the file /goform/SetSysTimeCfg of the component POST Request Handler. Executing a manipulation of the argument Time can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.
Title Tenda AC7 POST Request SetSysTimeCfg fromSetSysTime memory corruption
First Time appeared Tenda
Tenda ac7 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ac7_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac7 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T13:54:19.794Z

Reserved: 2026-03-27T08:56:49.008Z

Link: CVE-2026-4974

cve-icon Vulnrichment

Updated: 2026-03-31T13:54:15.075Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T20:16:38.473

Modified: 2026-03-30T19:33:20.427

Link: CVE-2026-4974

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:57:01Z

Weaknesses