CVE-2026-1420
Tenda AC23 WifiExtraSet buffer overflow
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown function of the file /goform/WifiExtraSet. This manipulation of the argument wpapsk_crypto causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
| CWE | CWE-120 CWE-119 |
| Vendor | tenda |
| Product | ac23 |
| Published | Jan 26, 2026 |
| Last Updated | Feb 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for tenda ac23
Be the first to know when new high vulnerabilities affecting tenda ac23 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Tenda / AC23
16.03.07.52
References
vuldb.com: https://vuldb.com/?id.342836 vuldb.com: https://vuldb.com/?ctiid.342836 vuldb.com: https://vuldb.com/?submit.736559 github.com: https://github.com/xyh4ck/iot_poc/blob/main/Tenda%20AC23_Buffer_Overflow_WifiExtraSet/Tenda%20AC23_Buffer_Overflow_WifiExtraSet.md github.com: https://github.com/xyh4ck/iot_poc/blob/main/Tenda%20AC23_Buffer_Overflow_WifiExtraSet/Tenda%20AC23_Buffer_Overflow_WifiExtraSet.md#poc tenda.com.cn: https://www.tenda.com.cn/
Credits
๐ xuanyu (VulDB User)