Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda cx12l Firmware
|
|
| CPEs | cpe:2.3:h:tenda:cx12l:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:cx12l_firmware:16.03.53.12:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda cx12l Firmware
|
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda cx12l |
|
| Vendors & Products |
Tenda
Tenda cx12l |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used. | |
| Title | Tenda CX12L addressNat fromAddressNat stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-07T15:09:20.002Z
Reserved: 2026-04-06T10:14:10.085Z
Link: CVE-2026-5685
Updated: 2026-04-07T14:48:33.929Z
Status : Analyzed
Published: 2026-04-06T22:16:24.690
Modified: 2026-04-29T22:37:18.397
Link: CVE-2026-5685
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:36:52Z