2026-03-16 17:32CVE-2026-4254VulDB
PUBLISHED5.2Operating systemCWE-121CWE-119

Tenda AC8 HTTP Endpoint SysToolChangePwd doSystemCmd stack-based overflow

A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

Problem type

Affected products

Tenda

AC8

16.03.50.0 - AFFECTED

16.03.50.1 - AFFECTED

16.03.50.2 - AFFECTED

16.03.50.3 - AFFECTED

16.03.50.4 - AFFECTED

16.03.50.5 - AFFECTED

16.03.50.6 - AFFECTED

16.03.50.7 - AFFECTED

16.03.50.8 - AFFECTED

16.03.50.9 - AFFECTED

16.03.50.10 - AFFECTED

16.03.50.11 - AFFECTED

References

GitHub Security Advisories

GHSA-7ppq-fx8r-g889

A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the...

https://github.com/advisories/GHSA-7ppq-fx8r-g889

A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-4254
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-4254",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2026-03-16T18:29:35.800Z",
    "dateReserved": "2026-03-16T06:16:10.100Z",
    "datePublished": "2026-03-16T17:32:11.090Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2026-03-16T17:32:11.090Z"
      },
      "title": "Tenda AC8 HTTP Endpoint SysToolChangePwd doSystemCmd stack-based overflow",
      "descriptions": [
        {
          "lang": "en",
          "value": "A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks."
        }
      ],
      "affected": [
        {
          "vendor": "Tenda",
          "product": "AC8",
          "cpes": [
            "cpe:2.3:o:tenda:ac8_firmware:*:*:*:*:*:*:*:*"
          ],
          "modules": [
            "HTTP Endpoint"
          ],
          "versions": [
            {
              "version": "16.03.50.0",
              "status": "affected"
            },
            {
              "version": "16.03.50.1",
              "status": "affected"
            },
            {
              "version": "16.03.50.2",
              "status": "affected"
            },
            {
              "version": "16.03.50.3",
              "status": "affected"
            },
            {
              "version": "16.03.50.4",
              "status": "affected"
            },
            {
              "version": "16.03.50.5",
              "status": "affected"
            },
            {
              "version": "16.03.50.6",
              "status": "affected"
            },
            {
              "version": "16.03.50.7",
              "status": "affected"
            },
            {
              "version": "16.03.50.8",
              "status": "affected"
            },
            {
              "version": "16.03.50.9",
              "status": "affected"
            },
            {
              "version": "16.03.50.10",
              "status": "affected"
            },
            {
              "version": "16.03.50.11",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Stack-based Buffer Overflow",
              "cweId": "CWE-121",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Memory Corruption",
              "cweId": "CWE-119",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/?id.351212",
          "name": "VDB-351212 | Tenda AC8 HTTP Endpoint SysToolChangePwd doSystemCmd stack-based overflow",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/?ctiid.351212",
          "name": "VDB-351212 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/?submit.771773",
          "name": "Submit #771773 | Tenda AC8 V5 V16.03.50.11 Buffer Overflow",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://github.com/digitalandrew/tenda_ac8_v5/blob/main/CVE_Report_Tenda_AC8_SysToolChangePwd_BOF.md",
          "tags": [
            "exploit"
          ]
        },
        {
          "url": "https://www.tenda.com.cn/",
          "tags": [
            "product"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
            "baseScore": 10
          }
        }
      ],
      "timeline": [
        {
          "time": "2026-03-16T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2026-03-16T01:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2026-03-16T07:21:20.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "DigitalAndrew (VulDB User)",
          "type": "reporter"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2026-03-16T18:29:35.800Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}