CVE-2026-2930
Published: 22 February 2026
Summary
CVE-2026-2930 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Tenda A18 Firmware. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Ongoing control assessments and code testing (static/dynamic analysis, fuzzing) surface memory buffer restriction failures, which are then remediated before release.
Managed runtimes used by platform-independent applications (e.g., JVM, CLR) enforce memory safety, preventing most buffer overflows that require direct memory manipulation.
Memory protections (e.g., W^X, ASLR) make exploitation of buffer-boundary violations far harder to turn into code execution.
Detects exploitation attempts that produce memory corruption, crashes, or anomalous behavior.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote stack-based buffer overflow in the router's public-facing Httpd web CGI (/cgi-bin/UploadCfg) directly enables exploitation of a network-accessible application by an authenticated attacker.
NVD Description
A vulnerability was identified in Tenda A18 15.13.07.13. The affected element is the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. Such manipulation of the argument boundary leads to stack-based buffer overflow. The attack can be executed…
more
remotely. The exploit is publicly available and might be used.
Deeper analysisAI
CVE-2026-2930 is a stack-based buffer overflow vulnerability in the Tenda A18 router running firmware version 15.13.07.13. The issue resides in the webCgiGetUploadFile function within the /cgi-bin/UploadCfg file of the Httpd Service component. By manipulating the "boundary" argument, an attacker can trigger the overflow remotely.
The vulnerability has a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), indicating network-accessible exploitation with low complexity that requires low privileges, no user interaction, and no scope change. A remote attacker with low-privilege access, such as an authenticated user, can exploit this to achieve limited impacts on confidentiality, integrity, and availability. A public exploit is available, increasing the risk of real-world attacks.
Advisories and details are documented in references including VulDB entries (ctiid.347277, id.347277, submit.755227) and a GitHub issue at master-abc/cve/issues/40, with the vendor site at tenda.com.cn potentially providing further guidance on patches or mitigations.
Details
- CWE(s)