CVE-2026-5685

A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used.
References
Link Resource
https://github.com/cve-a/lvdan/issues/3 Exploit Issue Tracking Third Party Advisory Mitigation
https://vuldb.com/submit/792782 Third Party Advisory VDB Entry
https://vuldb.com/vuln/355512 Third Party Advisory VDB Entry
https://vuldb.com/vuln/355512/cti Permissions Required VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:cx12l_firmware:16.03.53.12:*:*:*:*:*:*:*
cpe:2.3:h:tenda:cx12l:-:*:*:*:*:*:*:*

History

29 Apr 2026, 22:37

Type Values Removed Values Added
First Time Tenda
Tenda cx12l Firmware
Tenda cx12l
CPE cpe:2.3:h:tenda:cx12l:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:cx12l_firmware:16.03.53.12:*:*:*:*:*:*:*
References () https://github.com/cve-a/lvdan/issues/3 - () https://github.com/cve-a/lvdan/issues/3 - Exploit, Issue Tracking, Third Party Advisory, Mitigation
References () https://vuldb.com/submit/792782 - () https://vuldb.com/submit/792782 - Third Party Advisory, VDB Entry
References () https://vuldb.com/vuln/355512 - () https://vuldb.com/vuln/355512 - Third Party Advisory, VDB Entry
References () https://vuldb.com/vuln/355512/cti - () https://vuldb.com/vuln/355512/cti - Permissions Required, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

06 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 22:16

Updated : 2026-04-29 22:37


NVD link : CVE-2026-5685

Mitre link : CVE-2026-5685

CVE.ORG link : CVE-2026-5685


JSON object : View

Products Affected

tenda

  • cx12l
  • cx12l_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow