Vulnerabilities (CVE)

Filtered by vendor Tenda Subscribe
Total 627 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-4171 1 Tenda 2 W30e, W30e Firmware 2025-07-15 9.0 HIGH 8.8 HIGH
A vulnerability classified as critical has been found in Tenda W30E 1.0/1.0.1.25. Affected is the function fromWizardHandle of the file /goform/WizardHandle. The manipulation of the argument PPW leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-261990 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-7468 1 Tenda 2 Fh1201, Fh1201 Firmware 2025-07-15 9.0 HIGH 8.8 HIGH
A vulnerability has been found in Tenda FH1201 1.2.0.14 and classified as critical. This vulnerability affects the function fromSafeUrlFilter of the file /goform/fromSafeUrlFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2022-40847 1 Tenda 2 W15e, W15e Firmware 2025-07-07 N/A 7.8 HIGH
In Tenda AC1200 Router model W15Ev2 V15.11.0.10(1576), there exists a command injection vulnerability in the function formSetFixTools. This vulnerability allows attackers to run arbitrary commands on the server via the hostname parameter.
CVE-2022-42053 1 Tenda 2 W15e, W15e Firmware 2025-07-07 N/A 7.8 HIGH
Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a command injection vulnerability via the PortMappingServer parameter in the setPortMapping function.
CVE-2020-28095 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-07 7.8 HIGH 7.5 HIGH
On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, a large HTTP POST request sent to the change password API will trigger the router to crash and enter an infinite boot loop.
CVE-2024-46450 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-07 N/A 8.1 HIGH
Incorrect access control in Tenda AC1200 Smart Dual-Band WiFi Router Model AC6 v2.0 Firmware v15.03.06.50 allows attackers to bypass authentication via a crafted web request.
CVE-2024-48192 1 Tenda 2 G3, G3 Firmware 2025-07-07 N/A 8.0 HIGH
Tenda G3 v15.01.0.5(2848_755)_EN was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root
CVE-2024-33365 1 Tenda 2 Ac10, Ac10 Firmware 2025-07-07 N/A 7.5 HIGH
Buffer Overflow vulnerability in Tenda AC10 v4 US_AC10V4.0si_V16.03.10.20_cn allows a remote attacker to execute arbitrary code via the Virtual_Data_Check function in the bin/httpd component.
CVE-2025-50258 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-07 N/A 8.1 HIGH
Tenda AC6 v15.03.05.16_multi is vulnerable to Buffer Overflow in the SetSysTimeCfg function via the time parameter.
CVE-2025-50260 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-07 N/A 7.5 HIGH
Tenda AC6 v15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetFirewallCfg function via the firewallEn parameter.
CVE-2025-50262 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-07 N/A 7.5 HIGH
Tenda AC6 v15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetQosBand function via the list parameter.
CVE-2025-50263 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-07 N/A 8.1 HIGH
Tenda AC6 v15.03.05.16_multi is vulnerable to Buffer Overflow in the fromSetRouteStatic function via the list parameter.
CVE-2025-50528 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-01 N/A 7.3 HIGH
A buffer overflow vulnerability exists in the fromNatStaticSetting function of Tenda AC6 <=V15.03.05.19 via the page parameter.
CVE-2025-6886 1 Tenda 2 Ac5, Ac5 Firmware 2025-07-01 9.0 HIGH 8.8 HIGH
A vulnerability has been found in Tenda AC5 15.03.06.47 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. The manipulation of the argument schedStartTime/schedEndTime leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-6887 1 Tenda 2 Ac5, Ac5 Firmware 2025-07-01 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda AC5 15.03.06.47 and classified as critical. Affected by this issue is some unknown functionality of the file /goform/SetSysTimeCfg. The manipulation of the argument time/timeZone leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-0566 1 Tenda 2 Ac15, Ac15 Firmware 2025-07-01 9.0 HIGH 8.8 HIGH
A vulnerability classified as critical has been found in Tenda AC15 15.13.07.13. This affects the function formSetDevNetName of the file /goform/SetDevNetName. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-34338 1 Tenda 2 O3, O3 Firmware 2025-06-30 N/A 7.2 HIGH
Tenda O3V2 with firmware versions V1.0.0.10 and V1.0.0.12 was discovered to contain a Blind Command Injection via dest parameter in /goform/getTraceroute. This vulnerability allows attackers to execute arbitrary commands with root privileges. Authentication is required to exploit this vulnerability.
CVE-2024-32303 1 Tenda 2 Ac15, Ac15 Firmware 2025-06-30 N/A 8.0 HIGH
Tenda AC15 v15.03.20_multi, v15.03.05.19, and v15.03.05.18 firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function.
CVE-2025-5080 1 Tenda 2 Fh451, Fh451 Firmware 2025-06-20 9.0 HIGH 8.8 HIGH
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function webExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5978 1 Tenda 2 Fh1202, Fh1202 Firmware 2025-06-20 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.