CVE-2026-3400:
CVE-2026-3400
A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEditingConversion. The manipulation of the argument wp...
Overview
A critical security vulnerability has been identified in certain versions of the Tenda AC15 wireless router. The flaw resides in a specific administrative function and can be exploited by a remote attacker to trigger a stack-based buffer overflow. This type of vulnerability allows an attacker to potentially take control of the affected device.
Vulnerability Details
In simple terms, the router’s web management interface contains a feature for configuring Wi-Fi settings. A particular parameter (wpapsk_crypto2_4g) sent to this interface is not properly checked for size. By sending an overly long, specially crafted request to the /goform/TextEditingConversion page, an attacker can overflow a memory buffer on the device’s stack. This corruption can crash the router or, more critically, allow the attacker to execute arbitrary code. The exploit for this vulnerability is publicly available, increasing the risk of active attacks.
Potential Impact
If successfully exploited, this vulnerability can have severe consequences:
- Remote Code Execution: An unauthenticated attacker on the same network (or potentially from the internet if remote administration is enabled) could gain full control of the router.
- Network Compromise: A compromised router can be used to intercept all internet traffic, redirect users to malicious sites, steal credentials, and attack other devices on the local network.
- Denial of Service: Attack attempts could cause the router to become unstable or crash, resulting in a loss of internet connectivity for all connected devices.
Remediation and Mitigation
Immediate action is required to protect affected networks.
Primary Action - Firmware Update:
- Check your Tenda AC15 router’s firmware version via its web admin interface (typically
http://192.168.0.1orhttp://tendawifi.com). - If the firmware version is 15.13.07.13 or earlier, you are vulnerable.
- Visit the official Tenda website support section, locate your AC15 model, and download the latest available firmware. Version 15.13.07.13_Multi is confirmed vulnerable; you must install a newer version.
- Carefully follow the vendor’s instructions to upload and install the update.
Interim Mitigations (if update is not immediately possible):
- Disable WAN (Remote) Management: Ensure the router’s administrative interface is not accessible from the internet. This setting is usually found under “System Tools” or “Security” in the admin panel.
- Segment Networks: Place sensitive devices on a separate VLAN if your network infrastructure supports it, limiting the attack surface.
- Monitor for Anomalies: Watch for unexpected router reboots, configuration changes, or degraded performance.
After applying the firmware update, reboot the router to ensure the patch is fully active.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument P...
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory....
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The at...
A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. T...