6
0
6
0
Vulnerability Timeline
6 vulnerabilities discovered over time for A21 firmware
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-2886 | 7.4 | An attacker can remotely exploit a flaw in the Tenda A21 router's firmware to overwrite memory by sending a specially crafted device name, which could lead to unauthorized access or control of the device. This vulnerability is serious because it can be easily triggered without needing physical access to the router. | tendaa21 firmware | Exploit Available | about 2 months agoFeb 21, 2026 |
| CVE-2026-2874 | 7.4 | An attacker can remotely exploit a flaw in the Tenda A21 router's firmware to gain control of the device by manipulating the Wi-Fi network name (SSID), potentially allowing them to execute harmful code. This vulnerability requires no special access, making it particularly dangerous for users who haven't updated their firmware. | tendaa21 firmware | Exploit Available | about 2 months agoFeb 21, 2026 |
| CVE-2026-2873 | 7.4 | An attacker can remotely exploit a vulnerability in the Tenda A21 router to execute malicious code by manipulating specific settings related to scheduled Wi-Fi access, which can lead to a crash or unauthorized control of the device. This attack requires no special access, making it a significant risk for anyone using this router firmware version. | tendaa21 firmware | Exploit Available | about 2 months agoFeb 21, 2026 |
| CVE-2026-2872 | 7.4 | An attacker can remotely exploit a vulnerability in the Tenda A21 router to execute arbitrary code by manipulating the device name during MAC filtering configuration, potentially taking control of the device. This requires the attacker to send specially crafted data to the router, making it a serious risk for anyone using this firmware version. | tendaa21 firmware | Exploit Available | about 2 months agoFeb 21, 2026 |
| CVE-2026-2871 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on Tenda A21 routers by exploiting a flaw in the way the device handles certain input, leading to a stack-based buffer overflow. To successfully carry out the attack, the attacker needs to send specially crafted data to the router's configuration interface. | tendaa21 firmware | Exploit Available | about 2 months agoFeb 21, 2026 |
| CVE-2026-2870 | 7.4 | This vulnerability allows an attacker to remotely execute code on Tenda A21 routers by exploiting a flaw in the firmware that leads to a stack-based buffer overflow. The attacker just needs to send specially crafted data to the device, making it a serious risk for anyone using the affected firmware version. | tendaa21 firmware | Exploit Available | about 2 months agoFeb 21, 2026 |
About Tenda A21 firmware Security
This page provides comprehensive security vulnerability tracking for Tenda A21 firmware. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep A21 firmware updated to the latest version
- • Subscribe to security advisories from Tenda
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately