Description
A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overflow. The attack can be initiated remotely.
Published: 2026-04-05
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote stack-based buffer overflow leading to potential code execution
Action: Immediate Patch
AI Analysis

Impact

Tenda AC10 firmware includes a stack-based buffer overflow in the httpd fromSysToolChangePwd function. The vulnerability is triggered by manipulating the sys.userpass argument, allowing an attacker to overflow the stack. If successfully exploited, the attacker could execute arbitrary code on the device with the privileges of the httpd process, compromising confidentiality, integrity, and availability.

Affected Systems

The flaw affects the Tenda AC10 router running firmware version 16.03.10.10_multi_TDE01. Any device of this model and firmware should be considered vulnerable until a patch is applied.

Risk and Exploitability

The CVSS base score of 8.7 indicates high severity. Although EPSS data is missing and the weakness is not listed in KEV, the remote attack vector and lack of mitigation substantially raise the risk level. Exploitation requires the ability to send crafted requests to the device’s httpd service, which is typically reachable from the local network, creating a realistic threat for exposed or misconfigured devices.

Generated by OpenCVE AI on April 5, 2026 at 10:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify if a firmware update from Tenda addresses the stack overflow and apply it immediately.
  • If an update is unavailable, disable the affected httpd service or restrict access to the device from untrusted networks.
  • Consider isolating the router in a separate VLAN or applying network segmentation to limit exposure.
  • Monitor network traffic for abnormal httpd requests and log any anomalous activity.
  • If the device cannot be updated, physically replace it with a new model that does not contain the vulnerability.

Generated by OpenCVE AI on April 5, 2026 at 10:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac10
Vendors & Products Tenda ac10

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overflow. The attack can be initiated remotely.
Title Tenda AC10 httpd fromSysToolChangePwd stack-based overflow
First Time appeared Tenda
Tenda ac10 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ac10_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac10 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Tenda Ac10 Ac10 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T17:57:47.036Z

Reserved: 2026-04-04T13:28:04.091Z

Link: CVE-2026-5548

cve-icon Vulnrichment

Updated: 2026-04-06T17:57:43.480Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-05T08:16:24.650

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:06Z

Weaknesses