CVE-2026-24113

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size validation, it could lead to a buffer overflow vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*
cpe:2.3:h:tenda:w20e:4.0:*:*:*:*:*:*:*

History

05 Mar 2026, 16:16

Type Values Removed Values Added
References () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24113 - Exploit, Third Party Advisory () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24113 - Exploit, Third Party Advisory

03 Mar 2026, 15:53

Type Values Removed Values Added
First Time Tenda
Tenda w20e
Tenda w20e Firmware
References () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24113 - () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24113 - Exploit, Third Party Advisory
References () https://www.tenda.com.cn/material/show/2707 - () https://www.tenda.com.cn/material/show/2707 - Product
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-120
CPE cpe:2.3:h:tenda:w20e:4.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*

02 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-02 15:16

Updated : 2026-03-05 16:16


NVD link : CVE-2026-24113

Mitre link : CVE-2026-24113

CVE.ORG link : CVE-2026-24113


JSON object : View

Products Affected

tenda

  • w20e_firmware
  • w20e
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')