Description
A vulnerability was found in Tenda CX12L 16.03.53.12. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack must originate from the local network. The exploit has been made public and could be used.
Published: 2026-04-06
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Network Stack-based Overflow
Action: Patch Firmware
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow in the fromP2pListFilter function of the Tenda CX12L firmware version 16.03.53.12. Manipulating the page parameter on the /goform/P2pListFilter endpoint overflows a local buffer. This could corrupt the stack, resulting in either denial of service or the execution of arbitrary code within the context of the router’s firmware. The description does not confirm code execution, but stack overflows typically enable that risk.

Affected Systems

The only product identified by the CNA as affected is the Tenda CX12L model. The specific impacted firmware is 16.03.53.12. No other vendors, products, or versions are listed, so the scope is limited to that firmware release.

Risk and Exploitability

The CVSS base score of 5.1 indicates moderate severity. Exploitation requires access to the same local network, as the vulnerable endpoint must be reached from devices connected to the router. A public exploit has already been released, which suggests that the vulnerability is ready for use by attackers. The EPSS metric is not available, and the vulnerability is not on the CISA KEV catalog, implying that widespread exploitation is not yet documented. As the attack can be carried out from the local network, the most likely vector is a local attacker sending a crafted HTTP request to /goform/P2pListFilter with an oversized page parameter.

Generated by OpenCVE AI on April 7, 2026 at 02:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Acquire and install the latest Tenda firmware that addresses the stack overflow in the P2pListFilter function.
  • If no firmware update is available, restrict access to the /goform/P2pListFilter endpoint from untrusted LAN hosts by configuring firewall or VLAN rules.
  • Disable the P2P List Filter feature if the router interface allows it to eliminate the vulnerable code path.
  • Monitor router logs for repeated attempts to access the /goform/P2pListFilter endpoint and investigate any suspicious activity.

Generated by OpenCVE AI on April 7, 2026 at 02:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda cx12l
Vendors & Products Tenda
Tenda cx12l

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda CX12L 16.03.53.12. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack must originate from the local network. The exploit has been made public and could be used.
Title Tenda CX12L P2pListFilter fromP2pListFilter stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 5.2, 'vector': 'AV:A/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.5, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T19:34:26.551Z

Reserved: 2026-04-06T10:12:24.376Z

Link: CVE-2026-5683

cve-icon Vulnrichment

Updated: 2026-04-07T19:34:21.405Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T21:16:22.183

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-5683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:12Z

Weaknesses