Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
Tenda A21 Router: Uncontrolled Data Can Crash the Device
CVE-2026-2871
Summary
An attacker can send a specially crafted request to a Tenda A21 router, potentially causing it to crash. This could lead to loss of control over the device and make it unavailable for use. Users should update their router to the latest version to prevent this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| tenda | a21_firmware | 1.0.0.0 | – |
Original title
A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer ov...
Original description
A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/QIU-DIE/cve-nneeww/issues/2 Exploit Issue Tracking Mitigation Third Party Advisory
- https://vuldb.com/?ctiid.347108 Permissions Required VDB Entry
- https://vuldb.com/?id.347108 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754630 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754631 VDB Entry Third Party Advisory
- https://www.tenda.com.cn/ Product
Published: 21 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026