A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/942384053/cve/issues/3 | Issue Tracking |
| https://github.com/user-attachments/files/25824036/Tenda.A15.V15.13.07.13.Unauthenticated.Stack-based.Buffer.Overflow.in._cgi-bin_UploadCfg.zip | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.352404 | Permissions Required VDB Entry |
| https://vuldb.com/?id.352404 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.775156 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
02 Apr 2026, 12:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/942384053/cve/issues/3 - Issue Tracking | |
| References | () https://github.com/user-attachments/files/25824036/Tenda.A15.V15.13.07.13.Unauthenticated.Stack-based.Buffer.Overflow.in._cgi-bin_UploadCfg.zip - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.352404 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.352404 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.775156 - Third Party Advisory, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product | |
| CPE | cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:* cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:* |
|
| Summary |
|
|
| First Time |
Tenda
Tenda a15 Tenda a15 Firmware |
23 Mar 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 03:16
Updated : 2026-04-02 12:11
NVD link : CVE-2026-4567
Mitre link : CVE-2026-4567
CVE.ORG link : CVE-2026-4567
JSON object : View
Products Affected
tenda
- a15
- a15_firmware
