Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tenda:ac23_firmware:*:*:*:*:*:*:*:* |
Wed, 28 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac23 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac23_firmware:16.03.07.52:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac23 Firmware
|
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac23 |
|
| Vendors & Products |
Tenda
Tenda ac23 |
Mon, 26 Jan 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown function of the file /goform/WifiExtraSet. This manipulation of the argument wpapsk_crypto causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. | |
| Title | Tenda AC23 WifiExtraSet buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T08:56:57.929Z
Reserved: 2026-01-25T17:02:07.778Z
Link: CVE-2026-1420
Updated: 2026-01-26T17:03:59.469Z
Status : Analyzed
Published: 2026-01-26T06:16:04.073
Modified: 2026-01-28T14:44:39.930
Link: CVE-2026-1420
No data.
OpenCVE Enrichment
Updated: 2026-04-18T02:45:27Z