Vulnerability Description
A security flaw has been discovered in Tenda AC6 15.03.06.49_multi_TDE01. Affected is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet of the component httpd. Performing a manipulation of the argument mac/ssid results in os command injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac10U Firmware | 15.03.06.49_multi_tde01 |
| Tenda | Ac10U | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.mdExploitThird Party Advisory
- https://vuldb.com/submit/810074Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362560Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362560/ctiPermissions RequiredVDB Entry
- https://www.tenda.com.cn/Product
FAQ
What is CVE-2026-8263?
CVE-2026-8263 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A security flaw has been discovered in Tenda AC6 15.03.06.49_multi_TDE01. Affected is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet of the component httpd. Performing a manipulat...
How severe is CVE-2026-8263?
CVE-2026-8263 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8263?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac10U Firmware, Tenda Ac10U.