CVE-2026-4567
Published: 23 March 2026
Description
A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has…
more
been disclosed to the public and may be used.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the stack-based buffer overflow by requiring validation of the File argument in the UploadCfg function to prevent improper memory operations.
Implements memory safeguards like stack canaries or DEP to protect against exploitation of the buffer overflow for arbitrary code execution.
Requires timely identification and patching of the specific buffer overflow flaw in the Tenda A15 firmware to eliminate the vulnerability.
Security SummaryAI
CVE-2026-4567 is a stack-based buffer overflow vulnerability affecting the Tenda A15 router on firmware version 15.13.07.13. The issue resides in the UploadCfg function of the /cgi-bin/UploadCfg file, where manipulation of the File argument triggers the overflow. Published on 2026-03-23, it is associated with CWEs-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).
The vulnerability enables remote exploitation without authentication, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Attackers require only network access and can initiate the attack with low complexity, achieving high impacts on confidentiality, integrity, and availability. Successful exploitation may allow arbitrary code execution, potentially leading to full router compromise.
Advisories and exploit details are documented in references including a GitHub issue at https://github.com/942384053/cve/issues/3, a ZIP file containing an unauthenticated stack-based buffer overflow exploit at https://github.com/user-attachments/files/25824036/Tenda.A15.V15.13.07.13.Unauthenticated.Stack-based.Buffer.Overflow.in._cgi-bin_UploadCfg.zip, and VulDB entries at https://vuldb.com/?ctiid.352404, https://vuldb.com/?id.352404, and https://vuldb.com/?submit.775156. The public disclosure of the exploit heightens the risk of active exploitation.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a stack-based buffer overflow in a public-facing web CGI endpoint (/cgi-bin/UploadCfg) on a router, enabling unauthenticated remote code execution, directly mapping to exploitation of public-facing applications.