EUVD-2026-16474

| CVE-2026-4904 HIGH
2026-03-26 VulDB
7.4
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
X

Lifecycle Timeline

4
PoC Detected
Mar 31, 2026 - 20:59 vuln.today
Public exploit code
Analysis Generated
Mar 26, 2026 - 23:31 vuln.today
EUVD ID Assigned
Mar 26, 2026 - 23:31 euvd
EUVD-2026-16474
CVE Published
Mar 26, 2026 - 23:11 nvd
HIGH 7.4

Description

A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. Such manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

Stack-based buffer overflow in Tenda AC5 router firmware version 15.03.06.47 enables remote authenticated attackers to achieve arbitrary code execution with high impact to confidentiality, integrity, and availability. The vulnerability resides in the formSetCfm function's handling of the funcpara1 parameter in POST requests to /goform/setcfm. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all Tenda AC5 routers on the network and document firmware versions via device inventory or management console. Within 7 days: Implement network segmentation to restrict direct access to router management interfaces (restrict /goform/setcfm to administrative network only) and enforce strong authentication on all device admin accounts. …

Sign in for detailed remediation steps.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +37
POC: +20

Share

EUVD-2026-16474 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy