CVE-2026-24109

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `picName`. When this value is used in `sprintf` without validating variable sizes, it could lead to a buffer overflow vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*
cpe:2.3:h:tenda:w20e:4.0:*:*:*:*:*:*:*

History

05 Mar 2026, 16:16

Type Values Removed Values Added
References () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24109 - Exploit, Third Party Advisory () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24109 - Exploit, Third Party Advisory

03 Mar 2026, 15:54

Type Values Removed Values Added
First Time Tenda
Tenda w20e
Tenda w20e Firmware
References () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24109 - () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24109 - Exploit, Third Party Advisory
References () https://www.tenda.com.cn/material/show/2707 - () https://www.tenda.com.cn/material/show/2707 - Product
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:h:tenda:w20e:4.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*
CWE CWE-120

02 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-02 15:16

Updated : 2026-03-05 16:16


NVD link : CVE-2026-24109

Mitre link : CVE-2026-24109

CVE.ORG link : CVE-2026-24109


JSON object : View

Products Affected

tenda

  • w20e_firmware
  • w20e
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')