Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 30 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda cx12l Firmware
|
|
| CPEs | cpe:2.3:h:tenda:cx12l:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:cx12l_firmware:16.03.53.12:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda cx12l Firmware
|
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda cx12l |
|
| Vendors & Products |
Tenda
Tenda cx12l |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized. | |
| Title | Tenda CX12L webExcptypemanFilter fromwebExcptypemanFilter stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-07T13:40:48.280Z
Reserved: 2026-04-06T10:14:07.040Z
Link: CVE-2026-5684
Updated: 2026-04-07T13:40:43.059Z
Status : Analyzed
Published: 2026-04-06T22:16:24.483
Modified: 2026-04-30T15:18:52.123
Link: CVE-2026-5684
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:36:58Z