I21 Firmware Tenda I21 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Tenda I21 Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in Tenda I21 Firmware. I21 Firmware did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 14 8.80
2023 0 0.00
2022 5 9.80

It may take a day or so for new I21 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Tenda I21 Firmware Security Vulnerabilities

Tenda i21 1.0.0.14 Buffer Overflow in formexeCommand
CVE-2024-4497 8.8 - High - May 05, 2024

A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. This vulnerability affects the function formexeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263086 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14: formWifiMacFilterSet ssidIndex stack buffer overflow
CVE-2024-4496 8.8 - High - May 05, 2024

A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical. This affects the function formWifiMacFilterSet. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263085 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 Stack-Based Buffer Overflow in formWifiMacFilterGet
CVE-2024-4495 8.8 - High - May 05, 2024

A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. Affected by this issue is the function formWifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263084. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 Buffer Overflow in formSetUplinkInfo
CVE-2024-4494 8.8 - High - May 05, 2024

A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Affected by this vulnerability is the function formSetUplinkInfo of the file /goform/setUplinkInfo. The manipulation of the argument pingHostIp2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263083. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Critical IoT Buffer Overflow in Tenda i21 1.0.0.14 (formSetAutoPing)
CVE-2024-4493 8.8 - High - May 05, 2024

A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656). Affected is the function formSetAutoPing. The manipulation of the argument ping1/ping2 leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263082 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 stack overflow in formOfflineSet (critical)
CVE-2024-4492 8.8 - High - May 05, 2024

A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4656). This issue affects the function formOfflineSet of the file /goform/setStaOffline. The manipulation of the argument GO/ssidIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263081 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Stack Buffer Overflow in Tenda i21 1.0.0.14(4656) formGetDiagnoseInfo
CVE-2024-4491 8.8 - High - May 05, 2024

A vulnerability classified as critical was found in Tenda i21 1.0.0.14(4656). This vulnerability affects the function formGetDiagnoseInfo. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263080. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14/4656: Remote StackBuffer Overflow via DhcpSetSe
CVE-2024-4251 8.8 - High - April 27, 2024

A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been rated as critical. Affected by this issue is the function fromDhcpSetSer of the file /goform/DhcpSetSe. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-262142 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 Buffer Overflow in formwrlSSIDget
CVE-2024-4249 8.8 - High - April 27, 2024

A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical. Affected is the function formwrlSSIDget of the file /goform/wifiSSIDget. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-262140. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 stack buffer overflow in wifiSSIDset
CVE-2024-4250 8.8 - High - April 27, 2024

A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-262141 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 Remote Stack Buffer Overflow (ssidIndex)
CVE-2024-4248 8.8 - High - April 27, 2024

A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. This issue affects the function formQosManage_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-262139. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 Buffer Overflow in formQosManage_auto (CVE-2024-4247)
CVE-2024-4247 8.8 - High - April 27, 2024

A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. This vulnerability affects the function formQosManage_auto. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack can be initiated remotely. VDB-262138 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 Buffer Overflow via ssidIndex in formQosManageDouble_auto
CVE-2024-4246 8.8 - High - April 27, 2024

A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656). This affects the function formQosManageDouble_auto. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The identifier VDB-262137 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Tenda i21 1.0.0.14 stack-based buffer overflow via formQosManageDouble_user
CVE-2024-4245 8.8 - High - April 27, 2024

A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4656). Affected by this issue is the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be launched remotely. The identifier of this vulnerability is VDB-262136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Memory Corruption

Buffer Overflow in Tenda i21 V1.0.0.14 /goform/setDiagnoseInfo
CVE-2022-44366 9.8 - Critical - December 02, 2022

Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setDiagnoseInfo.

Memory Corruption

Tenda i21 V1.0.0.14 Stack Overflow via /goform/setSysPwd
CVE-2022-44365 9.8 - Critical - December 02, 2022

Tenda i21 V1.0.0.14(4656) has a stack overflow vulnerability via /goform/setSysPwd.

Memory Corruption

Tenda i21 Buffer Overflow in /goform/setSnmpInfo (v1.0.0.14)
CVE-2022-44363 9.8 - Critical - December 02, 2022

Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setSnmpInfo.

Memory Corruption

Tenda i21 Buffer Overflow via /goform/setUplinkInfo (V1.0.0.14)
CVE-2022-44367 9.8 - Critical - December 02, 2022

Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setUplinkInfo.

Memory Corruption

Tenda i21 V1.0.0.14 Buffer Overflow via /goform/AddSysLogRule
CVE-2022-44362 9.8 - Critical - December 02, 2022

Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/AddSysLogRule.

Memory Corruption

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Tenda I21 Firmware or by Tenda? Click the Watch button to subscribe.

Tenda
Vendor

subscribe