Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tenda:ac8_firmware:*:*:*:*:*:*:*:* |
Tue, 10 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac8 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac8_firmware:16.03.33.05:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac8 Firmware
|
Mon, 09 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac8 |
|
| Vendors & Products |
Tenda
Tenda ac8 |
Mon, 09 Feb 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow. The attack may be launched remotely. The exploit is now public and may be used. | |
| Title | Tenda AC8 httpd WifiGuestSet fromSetWifiGusetBasic buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T09:53:28.713Z
Reserved: 2026-02-07T17:49:16.946Z
Link: CVE-2026-2202
Updated: 2026-02-09T16:37:19.585Z
Status : Analyzed
Published: 2026-02-09T03:16:13.590
Modified: 2026-02-10T15:07:30.390
Link: CVE-2026-2202
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:45:28Z