CVE-2026-2140

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability exists in Tenda TX9 routers through firmware version 22.03.02.10_multi. Attackers can remotely exploit this vulnerability by sending specially crafted requests to the /goform/setMacFilterCfg endpoint, potentially allowing arbitrary code execution. This affects all users running vulnerable firmware versions.

💻 Affected Systems

Products:
  • Tenda TX9
Versions: Up to and including 22.03.02.10_multi
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations with vulnerable firmware are affected; the vulnerable endpoint is accessible by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers could execute arbitrary code with router privileges, potentially taking full control of the device, intercepting network traffic, or using it as a foothold for further attacks.

🟠

Likely Case

Remote code execution leading to device compromise, network traffic interception, or denial of service.

🟢

If Mitigated

If properly patched or isolated, the risk is eliminated; with workarounds, risk is reduced but not eliminated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exploit is available, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

Check Tenda's official website or support channels for firmware updates. If an update is available, download and install it following vendor instructions, then reboot the router.

🔧 Temporary Workarounds

Disable remote administration

all

Prevents external attackers from accessing the vulnerable endpoint by disabling remote management features.

Access router admin panel → Advanced Settings → Remote Management → Disable

Block access to vulnerable endpoint

linux

Use firewall rules to block access to /goform/setMacFilterCfg from untrusted networks.

iptables -A INPUT -p tcp --dport 80 -m string --string "/goform/setMacFilterCfg" --algo bm -j DROP

🧯 If You Can't Patch

  • Isolate affected routers in a separate network segment with strict firewall rules
  • Monitor network traffic for unusual requests to /goform/setMacFilterCfg

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin panel (typically at 192.168.0.1 or 192.168.1.1) → System Status → Firmware Version

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is above 22.03.02.10_multi after update

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /goform/setMacFilterCfg with long deviceList parameters
  • Router crash or reboot logs

Network Indicators:

  • Unusual traffic patterns to router administration interface from external IPs
  • HTTP requests with oversized deviceList parameters

SIEM Query:

source="router_logs" AND uri="/goform/setMacFilterCfg" AND (content_length>1000 OR user_agent="exploit")

🔗 References

📤 Share & Export