CVE-2026-2202

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Tenda AC8 routers allows remote attackers to execute arbitrary code by manipulating the shareSpeed parameter in the WiFi guest network configuration. This affects Tenda AC8 routers running firmware version 16.03.33.05. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • Tenda AC8
Versions: 16.03.33.05
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the httpd component handling WiFi guest network configuration. The vulnerable function is accessible via the web interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, credential theft, network traffic interception, and lateral movement into connected devices.

🟠

Likely Case

Router compromise leading to denial of service, configuration changes, or installation of persistent malware for network monitoring.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access, though internal network attacks remain possible.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via the router's web interface, making internet-exposed devices immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by any device on the network to compromise the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept demonstrates exploitation. The vulnerability requires sending a crafted HTTP request to the router's web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Tenda's official website or support portal for firmware updates. If available, download and install the latest firmware through the router's web interface.

🔧 Temporary Workarounds

Disable WiFi Guest Network

all

Disable the guest WiFi network feature to prevent access to the vulnerable function.

Access router web interface > WiFi Settings > Guest Network > Disable

Restrict Web Interface Access

linux

Configure firewall rules to restrict access to the router's web management interface.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Replace affected router with a different model or from a different vendor.
  • Place router behind a dedicated firewall that blocks all inbound traffic to the router's management interface.

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface: Login > System Status > Firmware Version. If version is 16.03.33.05, device is vulnerable.

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

After firmware update, verify version is no longer 16.03.33.05. Test by attempting to access the guest WiFi configuration page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/WifiGuestSet with long shareSpeed parameters
  • Router crash or reboot logs

Network Indicators:

  • HTTP traffic to router IP on port 80 with abnormal request sizes to WifiGuestSet endpoint
  • Sudden changes in router configuration

SIEM Query:

source="router_logs" AND url="/goform/WifiGuestSet" AND (param="shareSpeed" AND length(value)>100)

🔗 References

📤 Share & Export