A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow. The attack may be launched remotely. The exploit is now public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/AC8/WifiGuestSet-sharespeed-bufferoverflow.md | Exploit Third Party Advisory |
| https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/AC8/WifiGuestSet-sharespeed-bufferoverflow.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.344905 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344905 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.750225 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-09 03:16
Updated : 2026-02-10 15:07
NVD link : CVE-2026-2202
Mitre link : CVE-2026-2202
CVE.ORG link : CVE-2026-2202
JSON object : View
Products Affected
tenda
- ac8_firmware
- ac8
