Vulnerability Description
A security flaw has been discovered in Tenda AC8 16.03.50.11. This affects the function route_set_user_policy_rule of the file /cgi-bin/UploadCfg of the component Web Interface. The manipulation of the argument wans.policy.list1 results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac8 Firmware | 16.03.50.11 |
| Tenda | Ac8 | 5.0 |
Related Weaknesses (CWE)
References
- https://github.com/digitalandrew/tenda_ac8_v5/blob/main/poc_cmdi_config_upload.pExploit
- https://vuldb.com/?ctiid.351211Permissions RequiredVDB Entry
- https://vuldb.com/?id.351211Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.771771ExploitThird Party AdvisoryVDB Entry
- https://www.tenda.com.cn/Product
FAQ
What is CVE-2026-4253?
CVE-2026-4253 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A security flaw has been discovered in Tenda AC8 16.03.50.11. This affects the function route_set_user_policy_rule of the file /cgi-bin/UploadCfg of the component Web Interface. The manipulation of th...
How severe is CVE-2026-4253?
CVE-2026-4253 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4253?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac8 Firmware, Tenda Ac8.