Cyber Posture

CVE-2026-24114

CriticalPublic PoC

Published: 02 March 2026

Published
02 March 2026
Modified
03 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24114 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Tenda W20E Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 8.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2026-24114 by requiring identification, reporting, and timely patching of the buffer overflow flaw in the Tenda W20E firmware.

prevent

Enforces validation of inputs like pPortMapIndex to prevent buffer overflows from unvalidated parameters passed to strcpy.

prevent

Implements memory safeguards such as non-executable stacks and address space randomization to block arbitrary code execution from the buffer overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in network-accessible router firmware (web/management interface) directly enables remote unauthenticated exploitation of a public-facing application, leading to RCE/DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`.

Deeper analysisAI

CVE-2026-24114 is a buffer overflow vulnerability in the Tenda W20E router running firmware version V4.0br_V15.11.0.6. The issue stems from a failure to validate the `pPortMapIndex` parameter, which can lead to buffer overflows during the use of the `strcpy` function. Classified under CWE-120 (Buffer Copy without Checking Size of Input), it has a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited remotely by unauthenticated attackers over the network with no privileges or user interaction required. Successful exploitation allows attackers to trigger buffer overflows, potentially resulting in arbitrary code execution, denial of service, or unauthorized access to sensitive data and system control on the affected device.

Mitigation details are available in vendor resources, including the Tenda advisory at https://www.tenda.com.cn/material/show/2707. Additional technical reporting is provided in the GitHub repository at https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24114. Security practitioners should check these for firmware updates or workarounds specific to the Tenda W20E.

Details

CWE(s)

Affected Products

tenda
w20e firmware
15.11.0.6

CVEs Like This One

CVE-2026-24110Same product: Tenda W20E
CVE-2026-24111Same product: Tenda W20E
CVE-2026-24115Same product: Tenda W20E
CVE-2026-24112Same product: Tenda W20E
CVE-2026-24109Same product: Tenda W20E
CVE-2026-24113Same product: Tenda W20E
CVE-2026-24108Same product: Tenda W20E
CVE-2026-24107Same product: Tenda W20E
CVE-2025-29137Same vendor: Tenda
CVE-2025-55606Same vendor: Tenda

References