High (8.8)

Tenda A18 stack overflow leads to RCE (CVE-2026-2876)

CVE-2026-2876

Stack overflow in Tenda A18 lets attackers execute arbitrary code remotely. No patch available; restrict network access to the device immediately.

Affected: Tenda A18 Firmware Tenda A18

Vendor-confirmed - CVE-2026-2876 is a high-severity stack buffer overflow in Tenda A18 router firmware 15.13.07.13 that grants unauthenticated remote attackers arbitrary code execution and full device control. Apply the vendor’s patched firmware release as soon as it is available.

Security Advisory: Critical Buffer Overflow in Tenda A18 Router Firmware

Overview

A critical security vulnerability exists in the Tenda A18 wireless router, specifically in firmware version 15.13.07.13. The flaw is a stack-based buffer overflow in a key administrative function. An attacker can exploit this vulnerability by sending a specially crafted network request to the router’s web management interface, potentially allowing them to take control of the device.

Vulnerability Details

The vulnerability resides in the parse_macfilter_rule function, which handles the MAC address filtering feature on the router’s administrative page (/goform/setBlackRule). This function does not properly validate the length of input data supplied in the deviceList parameter. By sending an overly long string of characters to this parameter, an attacker can overflow a fixed-size buffer in the router’s memory (a “stack-based buffer overflow”). This can corrupt the router’s normal operation and allow the execution of malicious code.

Impact

Successful exploitation of this vulnerability could allow an unauthenticated, remote attacker to:

  • Execute arbitrary code on the router with full system privileges.
  • Compromise the router’s configuration, including network settings, DNS, and firewall rules.
  • Intercept or redirect network traffic passing through the router.
  • Create a persistent foothold on the network for further attacks against connected devices.
  • Render the router unstable or inoperable (a denial-of-service condition).

The vulnerability is particularly severe because it can be exploited remotely over the internet if the router’s management interface is exposed, and a public exploit is available.

Remediation and Mitigation

Immediate action is required for users of the affected firmware.

Primary Remediation:

  1. Check Firmware Version: Log into your Tenda A18 router’s web interface and navigate to the system status or firmware upgrade section.
  2. Upgrade Firmware: If your device is running version 15.13.07.13, you must upgrade to the latest firmware version provided by Tenda. Check the official Tenda website or support portal for a patched release. If a fixed version is not yet available, contact Tenda support directly for guidance.

Critical Mitigations (If a Patch is Not Available):

  • Disable Remote Management: Ensure the “Remote Management” or “Web Management from WAN” feature is turned OFF in the router’s administration settings. This prevents direct internet-based attacks.
  • Use a Firewall: Configure your network firewall to block all inbound connection attempts to the router’s private IP address (commonly 192.168.0.1 or 192.168.1.1) from the internet.
  • Monitor for Updates: Continue to check regularly for a firmware update from the vendor and apply it as soon as it is released.

Until the device is patched, it should be considered vulnerable to compromise from attackers on the local network or, if remote management is enabled, from the wider internet.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Tenda A18 Firmware Vulnerabilities

View all Tenda A18 Firmware vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.