CVE-2026-24110

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send overly long `addDhcpRules` data. When these rules enter the `addDhcpRule` function and are processed by `ret = sscanf(pRule, " %d\t%[^\t]\t%[^\n\r\t]", &dhcpsIndex, dhcpsIP, dhcpsMac);`, the lack of size validation for the rules could lead to buffer overflows in `dhcpsIndex`, `dhcpsIP`, and `dhcpsMac`.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*
cpe:2.3:h:tenda:w20e:4.0:*:*:*:*:*:*:*

History

03 Mar 2026, 15:51

Type Values Removed Values Added
References () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24110 - () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24110 - Exploit, Third Party Advisory
References () https://www.tenda.com.cn/material/show/2707 - () https://www.tenda.com.cn/material/show/2707 - Product
First Time Tenda
Tenda w20e
Tenda w20e Firmware
CPE cpe:2.3:h:tenda:w20e:4.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*

02 Mar 2026, 17:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-120

02 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-02 16:16

Updated : 2026-03-03 15:51


NVD link : CVE-2026-24110

Mitre link : CVE-2026-24110

CVE.ORG link : CVE-2026-24110


JSON object : View

Products Affected

tenda

  • w20e_firmware
  • w20e
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')