{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4253","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-16T06:16:07.224Z","datePublished":"2026-03-16T17:02:11.100Z","dateUpdated":"2026-03-16T18:01:14.327Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-16T17:02:11.100Z"},"title":"Tenda AC8 Web UploadCfg route_set_user_policy_rule os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Tenda","product":"AC8","versions":[{"version":"16.03.50.11","status":"affected"}],"cpes":["cpe:2.3:o:tenda:ac8_firmware:*:*:*:*:*:*:*:*"],"modules":["Web Interface"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Tenda AC8 16.03.50.11. This affects the function route_set_user_policy_rule of the file /cgi-bin/UploadCfg of the component Web Interface. The manipulation of the argument wans.policy.list1 results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-16T07:21:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"DigitalAndrew (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.351211","name":"VDB-351211 | Tenda AC8 Web UploadCfg route_set_user_policy_rule os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.351211","name":"VDB-351211 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.771771","name":"Submit #771771 | Tenda AC8 V5 V16.03.50.11 OS Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/digitalandrew/tenda_ac8_v5/blob/main/poc_cmdi_config_upload.py","tags":["exploit"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-16T18:00:20.811092Z","id":"CVE-2026-4253","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-16T18:01:14.327Z"}}]}}