CVE-2026-1329

A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the function fromGetWifiGuestBasic of the file /goform/WifiGuestSet. Executing a manipulation of the argument guestWrlPwd/guestEn/guestSsid/hideSsid/guestSecurity can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
References
Link Resource
https://river-brow-763.notion.site/Tenda-AX1803-Buffer-Overflow-in-fromGetWifiGusetBasic-2e3a595a7aef80a78225db34317daa40#2e3a595a7aef801ab517e4af5631227a Exploit Third Party Advisory
https://vuldb.com/?ctiid.342305 Permissions Required VDB Entry
https://vuldb.com/?id.342305 Third Party Advisory VDB Entry
https://vuldb.com/?submit.736063 Third Party Advisory VDB Entry
https://vuldb.com/?submit.736064 Third Party Advisory VDB Entry
https://vuldb.com/?submit.736065 Third Party Advisory VDB Entry
https://vuldb.com/?submit.736066 Third Party Advisory VDB Entry
https://vuldb.com/?submit.736067 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ax1803:-:*:*:*:*:*:*:*

History

03 Feb 2026, 13:59

Type Values Removed Values Added
First Time Tenda
Tenda ax1803
Tenda ax1803 Firmware
CPE cpe:2.3:h:tenda:ax1803:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1:*:*:*:*:*:*:*
References () https://river-brow-763.notion.site/Tenda-AX1803-Buffer-Overflow-in-fromGetWifiGusetBasic-2e3a595a7aef80a78225db34317daa40#2e3a595a7aef801ab517e4af5631227a - () https://river-brow-763.notion.site/Tenda-AX1803-Buffer-Overflow-in-fromGetWifiGusetBasic-2e3a595a7aef80a78225db34317daa40#2e3a595a7aef801ab517e4af5631227a - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.342305 - () https://vuldb.com/?ctiid.342305 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.342305 - () https://vuldb.com/?id.342305 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.736063 - () https://vuldb.com/?submit.736063 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.736064 - () https://vuldb.com/?submit.736064 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.736065 - () https://vuldb.com/?submit.736065 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.736066 - () https://vuldb.com/?submit.736066 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.736067 - () https://vuldb.com/?submit.736067 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

22 Jan 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-22 15:16

Updated : 2026-02-03 13:59


NVD link : CVE-2026-1329

Mitre link : CVE-2026-1329

CVE.ORG link : CVE-2026-1329


JSON object : View

Products Affected

tenda

  • ax1803_firmware
  • ax1803
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow