3
0
3
0
Vulnerability Timeline
3 vulnerabilities discovered over time for A18 firmware
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-2930 | 5.3 | This vulnerability allows an attacker to remotely execute code on Tenda A18 routers by exploiting a flaw in the file upload function, which can lead to a stack-based buffer overflow. To successfully carry out the attack, the attacker needs to manipulate specific input parameters, and there are already publicly available methods to exploit this weakness. | tendaa18 firmware | Exploit Available | about 1 month agoFeb 22, 2026 |
| CVE-2026-2877 | 7.4 | An attacker can remotely exploit a flaw in the Tenda A18 firmware to execute malicious code by overflowing a buffer when sending specially crafted data to the device's Wi-Fi settings. This vulnerability requires no physical access to the device, making it a serious risk for anyone using this router model. | tendaa18 firmware | Exploit Available | about 2 months agoFeb 21, 2026 |
| CVE-2026-2876 | 7.4 | An attacker can remotely exploit a vulnerability in the Tenda A18 router to execute arbitrary code by sending specially crafted data that causes a buffer overflow. This requires the attacker to have access to the router's settings, specifically through the function that manages MAC address filtering. | tendaa18 firmware | Exploit Available | about 2 months agoFeb 21, 2026 |
About Tenda A18 firmware Security
This page provides comprehensive security vulnerability tracking for Tenda A18 firmware. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep A18 firmware updated to the latest version
- • Subscribe to security advisories from Tenda
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately