Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-2192 β€” AI Deep Analysis Summary

CVSS 7.2 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Stack-based buffer overflow** in Tenda AC9’s `formGetRebootTimer` function. πŸ“Œ Attackers can crash device or execute arbitrary code via malformed reboot schedule params. πŸ’₯ Remote, high-impact.

Q2Root Cause? (CWE/Flaw)

πŸ” **CWE-121**: Improperly bounded buffer. πŸ“¦ `sys.schedulereboot.start_time`/`end_time` params not validated β†’ overflow stack buffer. 🧩 Classic buffer overflow flaw.

Q3Who is affected? (Versions/Components)

πŸ”Œ **Tenda AC9** firmware **v15.03.06.42_multi**. πŸ“¦ Affects `formGetRebootTimer` function. πŸ“Œ No other versions listed in data.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Remote code execution (RCE)**. 🧠 Can gain full control: read/write data, hijack device, pivot to network. 🎯 High privilege escalation potential.

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **High privilege required?** No. 🚫 But **authentication needed** (PR:H). πŸ“‘ Exploitation requires valid session (e.g., logged-in admin).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Public exploit exists!** πŸ“š PoC in GitHub repo: [IoT-Vulnerability/tenda4.md](https://github.com/glkfc/IoT-Vulnerability/blob/main/Tenda/tenda4.md). 🌐 Also reported in VulDB as exploited.

Q7How to self-check? (Features/Scanning)

πŸ” **Check firmware version**: Log into router β†’ Admin panel β†’ About. πŸ“Œ Look for **v15.03.06.42_multi**. πŸ§ͺ Use network scanners (e.g., Nmap) for Tenda AC9 devices.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **No official patch mentioned**. πŸ“„ Vendor site (tenda.com.cn) listed but no advisory found in data. ❌ Mitigation not confirmed.

Q9What if no patch? (Workaround)

πŸ› οΈ **Workaround**: Disable remote management. πŸ”’ Change admin password. 🚫 Avoid exposing router to internet. πŸ“Š Monitor logs for unusual reboot attempts.

Q10Is it urgent? (Priority Suggestion)

⚠️ **URGENT!** 🚨 CVSS 9.8 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). πŸ’£ Public exploit + RCE risk. πŸ“ˆ Patch ASAP or isolate device.