CVE-2026-3400 PUBLISHED

Tenda AC15 TextEditingConversion stack-based overflow

Assigner: VulDB
Reserved: 01.03.2026 Published: 01.03.2026 Updated: 02.03.2026

A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEditingConversion. The manipulation of the argument wpapsk_crypto2_4g results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CVSS Score: 8.7

Product Status

Vendor Tenda
Product AC15
Versions
  • Version 15.13.07.0 is affected
  • Version 15.13.07.1 is affected
  • Version 15.13.07.2 is affected
  • Version 15.13.07.3 is affected
  • Version 15.13.07.4 is affected
  • Version 15.13.07.5 is affected
  • Version 15.13.07.6 is affected
  • Version 15.13.07.7 is affected
  • Version 15.13.07.8 is affected
  • Version 15.13.07.9 is affected
  • Version 15.13.07.10 is affected
  • Version 15.13.07.11 is affected
  • Version 15.13.07.12 is affected
  • Version 15.13.07.13 is affected

Credits

  • Xuhsy (VulDB User) reporter

References

Problem Types

  • Stack-based Buffer Overflow CWE
  • Memory Corruption CWE