
CVE-2025-1853 – Tenda AC8 Parameter SetIpMacBind sub_49E098 stack-based overflow
https://notcve.org/view.php?id=CVE-2025-1853
03 Mar 2025 — A vulnerability was found in Tenda AC8 16.03.34.06 and classified as critical. This issue affects the function sub_49E098 of the file /goform/SetIpMacBind of the component Parameter Handler. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_sub_49E098.md • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2025-0528 – Tenda AC8/AC10/AC18 HTTP Request telnet command injection
https://notcve.org/view.php?id=CVE-2025-0528
17 Jan 2025 — A vulnerability, which was classified as critical, has been found in Tenda AC8, AC10 and AC18 16.03.10.20. Affected by this issue is some unknown functionality of the file /goform/telnet of the component HTTP Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Pr0b1em/IoT/blob/master/TendaAC10v16.03.10.20telnet.md • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2024-11745 – Tenda AC8 SetStaticRouteCfg route_static_check stack-based overflow
https://notcve.org/view.php?id=CVE-2024-11745
26 Nov 2024 — A vulnerability was found in Tenda AC8 16.03.34.09 and classified as critical. Affected by this issue is the function route_static_check of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://tasty-foxtrot-3a8.notion.site/Tenda-AC8v4-route_static_check-stack-overflow-1460448e6195803087a5d39755d2bb6b?pvs=74 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2024-10280 – Tenda AC6/AC7/AC8/AC9/AC10/AC10U/AC15/AC18/AC500/AC1206 GetIPTV websReadEvent null pointer dereference
https://notcve.org/view.php?id=CVE-2024-10280
23 Oct 2024 — A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. • https://github.com/JohenanLi/router_vuls/blob/main/websReadEvent/websReadEvent.md • CWE-476: NULL Pointer Dereference •

CVE-2024-10130 – Tenda AC8 SetSysAutoRebbotCfg formSetRebootTimer stack-based overflow
https://notcve.org/view.php?id=CVE-2024-10130
18 Oct 2024 — A vulnerability classified as critical was found in Tenda AC8 16.03.34.06. This vulnerability affects the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?id.280918 • CWE-121: Stack-based Buffer Overflow •

CVE-2024-10123 – Tenda AC8 saveParentControlInfo compare_parentcontrol_time stack-based overflow
https://notcve.org/view.php?id=CVE-2024-10123
18 Oct 2024 — A vulnerability was found in Tenda AC8 16.03.34.06. It has been declared as critical. Affected by this vulnerability is the function compare_parentcontrol_time of the file /goform/saveParentControlInfo. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be launched remotely. • https://github.com/JohenanLi/router_vuls/blob/main/ac8v4/compare_parentcontrol_time_vul.md • CWE-121: Stack-based Buffer Overflow •

CVE-2023-48194
https://notcve.org/view.php?id=CVE-2023-48194
09 Jul 2024 — Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \x0. After executing set_client_qos, control over the gp register can be obtained. Vulnerabilidad en Tenda AC8v4 .V16.03.34.09 debido a que sscanf y el último dígito de s8 se sobrescriben con \x0. Después de ejecutar set_client_qos, se puede obtener el control sobre el registro gp. • https://github.com/zt20xx/CVE-2023-48194 • CWE-787: Out-of-bounds Write •

CVE-2024-4066 – Tenda AC8 AdvSetMacMtuWan fromAdvSetMacMtuWan stack-based overflow
https://notcve.org/view.php?id=CVE-2024-4066
23 Apr 2024 — A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md • CWE-121: Stack-based Buffer Overflow •

CVE-2024-4065 – Tenda AC8 SetRebootTimer formSetRebootTimer stack-based overflow
https://notcve.org/view.php?id=CVE-2024-4065
23 Apr 2024 — A vulnerability was found in Tenda AC8 16.03.34.09. It has been rated as critical. This issue affects the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack may be initiated remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md • CWE-121: Stack-based Buffer Overflow •

CVE-2024-4064 – Tenda AC8 execCommand R7WebsSecurityHandler stack-based overflow
https://notcve.org/view.php?id=CVE-2024-4064
23 Apr 2024 — A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as critical. This vulnerability affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. The attack can be initiated remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md • CWE-121: Stack-based Buffer Overflow •