๐Ÿ” CVE Alert

CVE-2026-4254

CRITICAL 9.8

Tenda AC8 HTTP Endpoint SysToolChangePwd doSystemCmd stack-based overflow

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

CWE CWE-121 CWE-119
Vendor tenda
Product ac8
Published Mar 16, 2026
Last Updated Mar 16, 2026
Stay Ahead of the Next One

Get instant alerts for tenda ac8

Be the first to know when new critical vulnerabilities affecting tenda ac8 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Tenda / AC8
16.03.50.0 16.03.50.1 16.03.50.2 16.03.50.3 16.03.50.4 16.03.50.5 16.03.50.6 16.03.50.7 16.03.50.8 16.03.50.9 16.03.50.10 16.03.50.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.351212 vuldb.com: https://vuldb.com/?ctiid.351212 vuldb.com: https://vuldb.com/?submit.771773 github.com: https://github.com/digitalandrew/tenda_ac8_v5/blob/main/CVE_Report_Tenda_AC8_SysToolChangePwd_BOF.md tenda.com.cn: https://www.tenda.com.cn/

Credits

๐Ÿ” DigitalAndrew (VulDB User)