ID

VAR-202602-0224


CVE

CVE-2026-2147


TITLE

Shenzhen Tenda Technology Co.,Ltd. of ac21  Multiple vulnerabilities in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-003125

DESCRIPTION

A weakness has been identified in Tenda AC21 16.03.08.16. This impacts an unknown function of the file /cgi-bin/DownloadLog of the component Web Management Interface. Executing a manipulation can lead to information disclosure. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. This exploit has been made public and may be used in attacks.There is a possibility that some of the information handled by the software may be leaked to the outside. However, the information handled by the software will not be rewritten. Furthermore, the software will not stop

Trust: 1.62

sources: NVD: CVE-2026-2147 // JVNDB: JVNDB-2026-003125

AFFECTED PRODUCTS

vendor:tendamodel:ac21scope:eqversion:16.03.08.16

Trust: 1.0

vendor:tendamodel:ac21scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac21scope: - version: -

Trust: 0.8

vendor:tendamodel:ac21scope:eqversion:ac21 firmware 16.03.08.16

Trust: 0.8

sources: JVNDB: JVNDB-2026-003125 // NVD: CVE-2026-2147

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2026-2147
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2026-003125
value: MEDIUM

Trust: 0.8

cna@vuldb.com: CVE-2026-2147
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2026-003125
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2026-2147
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-003125
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-003125 // NVD: CVE-2026-2147

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.0

problemtype:CWE-200

Trust: 1.0

problemtype:information leak (CWE-200) [ others ]

Trust: 0.8

problemtype: Inappropriate access control (CWE-284) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-003125 // NVD: CVE-2026-2147

PATCH

title:httpsurl:https://github.com/master-abc/cve/issues/30

Trust: 0.8

sources: JVNDB: JVNDB-2026-003125

EXTERNAL IDS

db:NVDid:CVE-2026-2147

Trust: 2.6

db:VULDBid:344849

Trust: 1.0

db:JVNDBid:JVNDB-2026-003125

Trust: 0.8

sources: JVNDB: JVNDB-2026-003125 // NVD: CVE-2026-2147

REFERENCES

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://vuldb.com/?id.344849

Trust: 1.0

url:https://github.com/master-abc/cve/issues/30

Trust: 1.0

url:https://vuldb.com/?ctiid.344849

Trust: 1.0

url:https://vuldb.com/?submit.747429

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-2147

Trust: 0.8

sources: JVNDB: JVNDB-2026-003125 // NVD: CVE-2026-2147

SOURCES

db:JVNDBid:JVNDB-2026-003125
db:NVDid:CVE-2026-2147

LAST UPDATE DATE

2026-02-12T23:42:10.445000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-003125date:2026-02-12T07:26:00
db:NVDid:CVE-2026-2147date:2026-02-10T18:53:43.723

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-003125date:2026-02-12T00:00:00
db:NVDid:CVE-2026-2147date:2026-02-08T10:15:50.673