ID

VAR-202603-4936


CVE

CVE-2026-4902


TITLE

Shenzhen Tenda Technology Co.,Ltd. of AC5  Multiple vulnerabilities in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-009456

DESCRIPTION

A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. This exploit is now public and could be exploited.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-4902 // JVNDB: JVNDB-2026-009456

AFFECTED PRODUCTS

vendor:tendamodel:ac5scope:eqversion:15.03.06.47

Trust: 1.0

vendor:tendamodel:ac5scope: - version: -

Trust: 0.8

vendor:tendamodel:ac5scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac5scope:eqversion:ac5 firmware 15.03.06.47

Trust: 0.8

sources: JVNDB: JVNDB-2026-009456 // NVD: CVE-2026-4902

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2026-4902
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-009456
value: HIGH

Trust: 0.8

cna@vuldb.com: CVE-2026-4902
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2026-009456
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2026-4902
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-009456
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-009456 // NVD: CVE-2026-4902

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-009456 // NVD: CVE-2026-4902

PATCH

title://vuldb.com/?submit.777378url:https://lavender-bicycle-a5a.notion.site/Tenda_AC5_addressNat_page-32053a41781f8017938dda66f0193ebd?source=copy_link

Trust: 0.8

sources: JVNDB: JVNDB-2026-009456

EXTERNAL IDS

db:NVDid:CVE-2026-4902

Trust: 2.6

db:VULDBid:353653

Trust: 1.0

db:JVNDBid:JVNDB-2026-009456

Trust: 0.8

sources: JVNDB: JVNDB-2026-009456 // NVD: CVE-2026-4902

REFERENCES

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://vuldb.com/?ctiid.353653

Trust: 1.0

url:https://vuldb.com/?id.353653

Trust: 1.0

url:https://vuldb.com/?submit.777378

Trust: 1.0

url:https://lavender-bicycle-a5a.notion.site/tenda_ac5_addressnat_page-32053a41781f8017938dda66f0193ebd?source=copy_link

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-4902

Trust: 0.8

sources: JVNDB: JVNDB-2026-009456 // NVD: CVE-2026-4902

SOURCES

db:JVNDBid:JVNDB-2026-009456
db:NVDid:CVE-2026-4902

LAST UPDATE DATE

2026-04-03T23:26:44.248000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-009456date:2026-04-01T02:29:00
db:NVDid:CVE-2026-4902date:2026-03-31T01:36:18.920

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-009456date:2026-04-01T00:00:00
db:NVDid:CVE-2026-4902date:2026-03-26T23:16:21.090