{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2148","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-07T07:51:37.880Z","datePublished":"2026-02-08T10:32:08.524Z","dateUpdated":"2026-02-23T09:40:55.973Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:40:55.973Z"},"title":"Tenda AC21 Web Management DownloadFlash information disclosure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"Information Disclosure"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"Tenda","product":"AC21","versions":[{"version":"16.03.08.16","status":"affected"}],"cpes":["cpe:2.3:o:tenda:ac21_firmware:*:*:*:*:*:*:*:*"],"modules":["Web Management Interface"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in Tenda AC21 16.03.08.16. Affected is an unknown function of the file /cgi-bin/DownloadFlash of the component Web Management Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR"}}],"timeline":[{"time":"2026-02-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-11T09:56:15.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jiefengliang (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344850","name":"VDB-344850 | Tenda AC21 Web Management DownloadFlash information disclosure","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344850","name":"VDB-344850 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.747557","name":"Submit #747557 | Tenda AC21  V16.03.08.16 Missing Critical Step in Authentication","tags":["third-party-advisory"]},{"url":"https://github.com/master-abc/cve/issues/27","tags":["exploit","issue-tracking"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-10T21:20:34.525794Z","id":"CVE-2026-2148","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-10T21:20:41.316Z"}}]}}