Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
Tenda A21 1.0.0.0 WiFi Setting Function Allows Remote Attack
CVE-2026-2874
Summary
The Tenda A21 WiFi router's WiFi setting function has a security flaw that could allow an attacker to take control of the device remotely if they send a specially crafted message. This means that a hacker could potentially access and control your WiFi network. To protect your device, update to the latest firmware version as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| tenda | a21_firmware | 1.0.0.0 | – |
Original title
A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to ...
Original description
A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/QIU-DIE/cve-nneeww/issues/5 Exploit Issue Tracking Mitigation Third Party Advisory
- https://vuldb.com/?ctiid.347111 Permissions Required VDB Entry
- https://vuldb.com/?id.347111 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754636 Third Party Advisory VDB Entry
- https://www.tenda.com.cn/ Product
Published: 21 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026