CVE-2026-2192
7.2 HIGHPublished 2026-02-08 · Modified 2026-02-09 · Undergoing Analysis
Quick Summary
A vulnerability in the Tenda AC9 router's web interface allows remote attackers to crash the device or potentially run malicious code by sending specially crafted data. This is a serious flaw because it can be exploited over the internet with little effort.
Who is affected
Users of Tenda AC9 routers with firmware version 15.03.06.42_multi are affected. An attacker could take control of the router, disrupt internet access, or use it to launch further attacks on the local network.
Recommended fix
Immediately upgrade the router's firmware to a version newer than 15.03.06.42_multi, as provided by Tenda. If no patch is available, disable remote administration (WAN access) to the router's web interface as a critical workaround.
Technical Description
A security vulnerability has been detected in Tenda AC9 15.03.06.42_multi. Affected by this vulnerability is the function formGetRebootTimer. Such manipulation of the argument sys.schedulereboot.start_time/sys.schedulereboot.end_time leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
CVSS Details
Attack Vector
NETWORK
Complexity
LOW
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE
CWE-119, CWE-121