CVE-2026-2147
Analyzed Analyzed - Analysis Complete
Information Disclosure via Remote Exploit in Tenda AC21 Web Interface

Publication date: 2026-02-08

Last updated on: 2026-02-10

Assigner: VulDB

Description
A weakness has been identified in Tenda AC21 16.03.08.16. This impacts an unknown function of the file /cgi-bin/DownloadLog of the component Web Management Interface. Executing a manipulation can lead to information disclosure. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-08
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tenda ac21_firmware 16.03.08.16
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-2147 is an information disclosure vulnerability in the Tenda AC21 router firmware version 16.03.08.16. It affects the Web Management Interface, specifically the endpoint /cgi-bin/DownloadLog, which lacks proper authentication and authorization checks.

This flaw allows remote attackers to send unauthenticated HTTP requests to the vulnerable endpoint and download sensitive system logs without any credentials. The logs may contain internal IP addresses, network topology, device MAC addresses, connection records, system error messages, debugging information, and login attempt records including usernames and failed password attempts.

The vulnerability arises because the backend function handling /cgi-bin/DownloadLog does not verify user sessions or tokens before processing requests, enabling attackers to bypass login and access sensitive information remotely.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information from your network device. Attackers can remotely access detailed system logs without authentication.

  • Exposure of internal IP addresses and network topology details.
  • Leakage of device MAC addresses and connection records.
  • Disclosure of system error messages and debugging information.
  • Potential exposure of login attempt records, including usernames and failed password attempts.

Such information can aid attackers in mapping your network, identifying vulnerable devices, and launching further targeted attacks, increasing the risk of compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to access the vulnerable endpoints on the Tenda AC21 router without authentication and checking if sensitive logs are returned.'}, {'type': 'paragraph', 'content': 'A practical detection method involves sending unauthenticated HTTP GET requests to the endpoints /cgi-bin/DownloadLog or /cgi-bin/DownloadSyslog and analyzing the response for sensitive information such as internal IP addresses, MAC addresses, usernames, or error messages.'}, {'type': 'paragraph', 'content': 'For example, using curl commands to test the endpoints:'}, {'type': 'list_item', 'content': 'curl http://<router-ip>/cgi-bin/DownloadLog'}, {'type': 'list_item', 'content': 'curl http://<router-ip>/cgi-bin/DownloadSyslog'}, {'type': 'paragraph', 'content': 'If the response contains system logs or sensitive information without requiring authentication, the vulnerability is present.'}, {'type': 'paragraph', 'content': "Additionally, a Python script using the requests library can automate this detection by sending GET requests and analyzing the content for keywords like 'password', 'admin', 'fail', or IP addresses."}] [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable web management interface endpoints to prevent unauthorized access.

  • Apply strict firewall rules to block external or untrusted IP addresses from accessing /cgi-bin/DownloadLog and /cgi-bin/DownloadSyslog endpoints.
  • Enforce authentication and session validation on the vulnerable endpoints to ensure only authorized administrators can access system logs.
  • Implement Access Control Lists (ACLs) to limit access to these endpoints to trusted internal IP addresses.
  • Remove or disable debugging interfaces and sensitive log download features in production firmware if possible.
  • Consider applying data masking techniques to redact sensitive information in logs before they are transmitted.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart