CVE-2026-2192

7.2 HIGH

Published 2026-02-08 · Modified 2026-02-09 · Undergoing Analysis

Quick Summary

A vulnerability in the Tenda AC9 router's web interface allows remote attackers to crash the device or potentially run malicious code by sending specially crafted data. This is a serious flaw because it can be exploited over the internet with little effort.

Who is affected

Users of Tenda AC9 routers with firmware version 15.03.06.42_multi are affected. An attacker could take control of the router, disrupt internet access, or use it to launch further attacks on the local network.

Recommended fix

Immediately upgrade the router's firmware to a version newer than 15.03.06.42_multi, as provided by Tenda. If no patch is available, disable remote administration (WAN access) to the router's web interface as a critical workaround.

Technical Description

A security vulnerability has been detected in Tenda AC9 15.03.06.42_multi. Affected by this vulnerability is the function formGetRebootTimer. Such manipulation of the argument sys.schedulereboot.start_time/sys.schedulereboot.end_time leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

CVSS Details

Attack Vector

NETWORK

Complexity

LOW

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CWE

CWE-119, CWE-121

References