ID

VAR-202602-0322


CVE

CVE-2026-2191


TITLE

Shenzhen Tenda Technology Co.,Ltd. of AC9  Multiple vulnerabilities in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-003112

DESCRIPTION

A weakness has been identified in Tenda AC9 15.03.06.42_multi. Affected is the function formGetDdosDefenceList. This manipulation of the argument security.ddos.map causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. This attack can be launched remotely and there is a publicly available exploit that can be used to carry out the attack.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely

Trust: 1.62

sources: NVD: CVE-2026-2191 // JVNDB: JVNDB-2026-003112

AFFECTED PRODUCTS

vendor:tendamodel:ac9scope:eqversion:15.03.06.42_multi

Trust: 1.0

vendor:tendamodel:ac9scope: - version: -

Trust: 0.8

vendor:tendamodel:ac9scope:eqversion:ac9 firmware 15.03.06.42_multi

Trust: 0.8

vendor:tendamodel:ac9scope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-003112 // NVD: CVE-2026-2191

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2026-2191
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-003112
value: HIGH

Trust: 0.8

cna@vuldb.com: CVE-2026-2191
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2026-003112
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2026-2191
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-003112
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-003112 // NVD: CVE-2026-2191

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-003112 // NVD: CVE-2026-2191

PATCH

title:Submit #749800url:https://github.com/glkfc/IoT-Vulnerability/blob/main/Tenda/tenda3.md

Trust: 0.8

sources: JVNDB: JVNDB-2026-003112

EXTERNAL IDS

db:NVDid:CVE-2026-2191

Trust: 2.6

db:VULDBid:344894

Trust: 1.0

db:JVNDBid:JVNDB-2026-003112

Trust: 0.8

sources: JVNDB: JVNDB-2026-003112 // NVD: CVE-2026-2191

REFERENCES

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://github.com/glkfc/iot-vulnerability/blob/main/tenda/tenda3.md

Trust: 1.0

url:https://vuldb.com/?submit.749800

Trust: 1.0

url:https://vuldb.com/?ctiid.344894

Trust: 1.0

url:https://vuldb.com/?id.344894

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-2191

Trust: 0.8

sources: JVNDB: JVNDB-2026-003112 // NVD: CVE-2026-2191

SOURCES

db:JVNDBid:JVNDB-2026-003112
db:NVDid:CVE-2026-2191

LAST UPDATE DATE

2026-02-12T23:49:31.350000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-003112date:2026-02-12T07:26:00
db:NVDid:CVE-2026-2191date:2026-02-10T15:09:59.060

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-003112date:2026-02-12T00:00:00
db:NVDid:CVE-2026-2191date:2026-02-08T23:15:49.483