CVE-2026-3400

A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEditingConversion. The manipulation of the argument wpapsk_crypto2_4g results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
References
Link Resource
https://vuldb.com/?ctiid.348295 Permissions Required VDB Entry
https://vuldb.com/?id.348295 Third Party Advisory VDB Entry
https://vuldb.com/?submit.760109 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
https://www.yuque.com/ba1ma0-an29k/nnxoap/tzg68iadbmqx6esm?singleDoc# Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac15_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-02 00:16

Updated : 2026-03-03 19:48


NVD link : CVE-2026-3400

Mitre link : CVE-2026-3400

CVE.ORG link : CVE-2026-3400


JSON object : View

Products Affected

tenda

  • ac15_firmware
  • ac15
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write