Description
A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-04-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the fromAddressNat function of Tenda CX12L firmware 16.03.53.12. By manipulating the page argument, an attacker can overwrite memory on the stack, potentially enabling arbitrary code execution on the device. The flaw is triggered through a remote request, and the public exploit raises the risk of a full system compromise. The vulnerability is classified as CWE‑119 and CWE‑121.

Affected Systems

The affected product is the Tenda CX12L wireless router running firmware version 16.03.53.12. No other versions are explicitly listed; users of this specific build are at risk.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, and the lack of an EPSS rating does not diminish the fact that the exploit is publicly available and can be triggered remotely. While the vulnerability is not currently in the CISA KEV catalog, its remote nature and confirmed exploit code make it a likely target for adversaries. The high score, remote attack vector, and public exploit suggest that the risk is significant and should be addressed promptly.

Generated by OpenCVE AI on April 7, 2026 at 01:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by Tenda
  • If an official patch is not available, disable remote management interfaces or restrict access to trusted IPs
  • Ensure that default credentials have been changed and enforce strong password policies
  • Apply network segmentation or firewall rules to block unnecessary ports used by the vulnerable service
  • Regularly monitor logs for anomalous activity related to the addressNat function

Generated by OpenCVE AI on April 7, 2026 at 01:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda cx12l Firmware
CPEs cpe:2.3:h:tenda:cx12l:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:cx12l_firmware:16.03.53.12:*:*:*:*:*:*:*
Vendors & Products Tenda cx12l Firmware

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda cx12l
Vendors & Products Tenda
Tenda cx12l

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used.
Title Tenda CX12L addressNat fromAddressNat stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Cx12l Cx12l Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T15:09:20.002Z

Reserved: 2026-04-06T10:14:10.085Z

Link: CVE-2026-5685

cve-icon Vulnrichment

Updated: 2026-04-07T14:48:33.929Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:24.690

Modified: 2026-04-29T22:37:18.397

Link: CVE-2026-5685

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:36:52Z

Weaknesses