INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h
Vulnerabilities

CVE-2026-2877

High
A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypt
CWE-119 — Weakness Type
Published: Feb 21, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

🤖 AI Executive Summary

A critical stack-based buffer overflow vulnerability exists in Tenda A18 router firmware (version 15.13.07.13) affecting the WiFi configuration service. The vulnerability in the /goform/WifiExtraSet endpoint allows remote attackers to execute arbitrary code by manipulating the wpapsk_crypto5g parameter. With a CVSS score of 8.8 and public disclosure, this poses an immediate threat to organizations relying on Tenda networking equipment across Saudi Arabia.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 22:58
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability directly impacts Saudi organizations across multiple critical sectors: (1) Banking & Financial Services — institutions using Tenda routers for branch connectivity and SAMA-regulated networks face potential data exfiltration and system compromise; (2) Government & NCA — federal agencies and critical infrastructure operators relying on Tenda equipment for network segmentation are at risk; (3) Healthcare — SEHA-affiliated hospitals and private healthcare providers using these routers for patient data networks; (4) Energy Sector — ARAMCO and downstream petroleum companies with Tenda equipment in operational technology networks; (5) Telecommunications — STC, Mobily, and Zain infrastructure potentially affected; (6) SMEs & Retail — widespread adoption of Tenda A18 in small-to-medium enterprises across Saudi Arabia makes this a high-impact vulnerability. Remote exploitation without authentication makes this particularly dangerous in the Saudi threat landscape.
🏢 Affected Saudi Sectors
Banking & Financial Services Government & Critical Infrastructure Healthcare Energy & Petroleum Telecommunications Small-to-Medium Enterprises Retail & E-commerce Education Manufacturing
⚖️ Saudi Risk Score (AI)
8.9
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Tenda A18 devices running firmware 15.13.07.13 in your network using network scanning tools (nmap, Shodan queries for Saudi IP ranges)
2. Isolate affected devices from critical networks if patching cannot be completed within 24 hours
3. Implement network segmentation to restrict access to /goform/WifiExtraSet endpoint
4. Enable router access logs and monitor for suspicious HTTP POST requests to /goform/WifiExtraSet

PATCHING GUIDANCE:
1. Download latest Tenda A18 firmware from official Tenda support portal (verify digital signatures)
2. Backup current router configuration before firmware update
3. Apply firmware update through router admin interface (192.168.0.1) or via TFTP if web interface is compromised
4. Verify firmware version post-update using: telnet/SSH to router and check 'cat /proc/version'
5. Reset router to factory defaults if update fails, then reconfigure

COMPENSATING CONTROLS (if patch unavailable):
1. Restrict HTTP/HTTPS access to router management interface to authorized IPs only (whitelist corporate networks)
2. Disable remote management features in router settings
3. Implement WAF rules blocking POST requests with 'wpapsk_crypto5g' parameter
4. Deploy IDS/IPS signatures detecting buffer overflow patterns in HTTP requests
5. Monitor router CPU/memory usage for exploitation attempts

DETECTION RULES:
1. Snort/Suricata: alert http any any -> any any (msg:"Tenda A18 Buffer Overflow Attempt"; content:"POST"; http_method; content:"/goform/WifiExtraSet"; http_uri; content:"wpapsk_crypto5g"; http_client_body; pcre:"/wpapsk_crypto5g=.{256,}/i"; sid:1000001;)
2. Log Analysis: Search for POST requests to /goform/WifiExtraSet with wpapsk_crypto5g parameter values exceeding 128 characters
3. Network Monitoring: Alert on unexpected outbound connections from router IP addresses
4. Endpoint Detection: Monitor for processes spawned by httpd service with unusual privileges
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة Tenda A18 التي تعمل بالإصدار 15.13.07.13 في شبكتك باستخدام أدوات المسح (nmap، استعلامات Shodan للنطاقات السعودية)
2. عزل الأجهزة المتأثرة عن الشبكات الحرجة إذا لم يتمكن من تطبيق التصحيح خلال 24 ساعة
3. تنفيذ تقسيم الشبكة لتقييد الوصول إلى نقطة النهاية /goform/WifiExtraSet
4. تفعيل سجلات وصول جهاز التوجيه ومراقبة طلبات HTTP POST المريبة

إرشادات التصحيح:
1. تحميل أحدث برنامج تشغيل Tenda A18 من بوابة دعم Tenda الرسمية (التحقق من التوقيعات الرقمية)
2. نسخ احتياطي من إعدادات جهاز التوجيه الحالية قبل تحديث البرنامج
3. تطبيق تحديث البرنامج من خلال واجهة إدارة جهاز التوجيه (192.168.0.1) أو عبر TFTP
4. التحقق من إصدار البرنامج بعد التحديث
5. إعادة تعيين جهاز التوجيه إلى إعدادات المصنع إذا فشل التحديث

الضوابط البديلة:
1. تقييد الوصول إلى واجهة إدارة جهاز التوجيه للعناوين المصرح بها فقط
2. تعطيل ميزات الإدارة البعيدة
3. تنفيذ قواعد WAF لحظر طلبات POST
4. نشر توقيعات IDS/IPS
5. مراقبة استخدام CPU والذاكرة

قواعد الكشف:
1. تنبيهات Snort/Suricata للطلبات المريبة
2. تحليل السجلات للطلبات ذات القيم الطويلة
3. مراقبة الاتصالات الخارجية غير المتوقعة
4. كشف العمليات غير العادية من خدمة httpd
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Network Security Controls (router firmware management) ECC 2024 A.5.1.2 - Access Control (restrict management interface access) ECC 2024 A.5.2.1 - Vulnerability Management (identify and patch vulnerable devices) ECC 2024 A.5.3.1 - Incident Detection (IDS/IPS for exploitation attempts) ECC 2024 A.5.4.1 - Logging and Monitoring (router access logs)
🔵 SAMA CSF
SAMA CSF ID.RA-1 - Asset Management (inventory Tenda devices) SAMA CSF PR.IP-12 - Software Supply Chain Security (firmware verification) SAMA CSF PR.PT-1 - Protective Technology (network segmentation) SAMA CSF DE.CM-1 - Detection Processes (IDS/IPS monitoring) SAMA CSF RS.MI-2 - Incident Mitigation (isolate compromised devices)
🟡 ISO 27001:2022
ISO 27001:2022 A.5.1.1 - Policies for information security (patch management policy) ISO 27001:2022 A.5.2.1 - Information security roles and responsibilities ISO 27001:2022 A.5.2.2 - Segregation of duties (network access controls) ISO 27001:2022 A.8.1.1 - User endpoint devices (router security) ISO 27001:2022 A.8.2.1 - Privileged access rights (router admin access) ISO 27001:2022 A.8.2.3 - Information access restriction ISO 27001:2022 A.8.3.1 - User password management ISO 27001:2022 A.8.3.2 - Privileged access management
🟣 PCI DSS v4.0
PCI DSS 6.2 - Security patches and updates (firmware patching) PCI DSS 1.1 - Firewall configuration standards (network segmentation) PCI DSS 1.2 - Firewall and router configuration documentation PCI DSS 2.1 - Default security parameters (router hardening) PCI DSS 10.1 - Audit trails (logging router access)
📦 Affected Products / CPE 1 entries
tenda:a18_firmware:15.13.07.13
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-119
EPSS0.08%
Exploit No
Patch ✓ Yes
Published 2026-02-21
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.9
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-119
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.