Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
Tenda A21 Router Allows Remote Code Execution
CVE-2026-2873
Summary
A security flaw in the Tenda A21 router's scheduling feature can be exploited by an attacker to execute malicious code remotely. This could potentially allow an attacker to take control of the router. Update the router's software to fix the issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| tenda | a21_firmware | 1.0.0.0 | – |
Original title
A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndT...
Original description
A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/QIU-DIE/cve-nneeww/issues/4 Exploit Issue Tracking Mitigation Third Party Advisory
- https://vuldb.com/?ctiid.347110 Permissions Required VDB Entry
- https://vuldb.com/?id.347110 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754635 Third Party Advisory VDB Entry
- https://www.tenda.com.cn/ Product
Published: 21 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026