Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
ac7_firmware Vendor: tenda

About This Product

ac7_firmware is a software product offered by tenda. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 67 known vulnerabilities affecting tenda ac7_firmware. This includes 20 critical-severity issues and 39 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2026, indicating a sustained research interest and ongoing security attention. 8 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-18706 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18707 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18708 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18709 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18727 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18729 2018-10-29 2024-11-21 9.8 9.0 Likely
CVE-2018-18730 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18731 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18732 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-14558 2018-10-30 2025-11-07 9.8 10.0 Likely
CVE-2018-14557 2019-04-25 2024-11-21 7.5 7.8 Likely
CVE-2018-14559 2019-04-25 2024-11-21 7.5 7.8 Likely
CVE-2023-37714 2023-07-14 2024-11-21 9.8 - -
CVE-2023-37716 2023-07-14 2024-11-21 9.8 - -
CVE-2023-37717 2023-07-14 2024-11-21 9.8 - -
CVE-2023-38930 2023-08-07 2024-11-21 9.8 - -
CVE-2023-38931 2023-08-07 2024-11-21 9.8 - -
CVE-2023-38933 2023-08-07 2024-11-21 9.8 - -
CVE-2023-38936 2023-08-07 2024-11-21 9.8 - -
CVE-2023-38937 2023-08-07 2024-11-21 9.8 - -
CVE-2023-41552 2023-08-30 2024-11-21 9.8 - -
CVE-2023-41555 2023-08-30 2024-11-21 9.8 - -
CVE-2023-41556 2023-08-30 2024-11-21 9.8 - -
CVE-2023-41557 2023-08-30 2024-11-21 9.8 - -
CVE-2023-41558 2023-08-30 2024-11-21 9.8 - -
CVE-2023-41559 2023-08-30 2024-11-21 9.8 - -
CVE-2023-41562 2023-08-30 2024-11-21 9.8 - -
CVE-2024-2891 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2892 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2893 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2894 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2895 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2896 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2897 2024-03-26 2025-01-22 6.3 6.5 Likely
CVE-2024-2898 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2899 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2900 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2901 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2902 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-2903 2024-03-26 2025-01-22 8.8 9.0 Likely
CVE-2024-32281 2024-04-17 2025-03-17 8.8 - -
CVE-2024-32301 2024-04-17 2025-03-17 9.8 - -
CVE-2024-10280 2024-10-23 2024-11-01 6.5 6.8 Likely
CVE-2024-48825 2024-10-28 2025-03-17 8.8 - -
CVE-2024-48826 2024-10-28 2025-03-17 8.8 - -
CVE-2025-1819 2025-03-02 2025-07-16 6.3 6.5 Likely
CVE-2025-1851 2025-03-03 2025-04-10 8.8 9.0 Likely
CVE-2025-29137 2025-03-19 2025-04-01 9.8 - -
CVE-2025-29135 2025-03-24 2025-04-01 9.8 - -
CVE-2025-3346 2025-04-07 2025-05-27 8.8 9.0 Likely
CVE-2025-4809 2025-05-16 2025-05-24 8.8 9.0 Likely
CVE-2025-4810 2025-05-16 2025-05-24 8.8 9.0 Likely
CVE-2025-5861 2025-06-09 2025-06-09 8.8 9.0 Likely
CVE-2025-5862 2025-06-09 2025-06-09 8.8 9.0 Likely
CVE-2025-8017 2025-07-22 2025-08-01 8.8 9.0 Likely
CVE-2025-9023 2025-08-15 2025-10-03 8.8 9.0 Likely
CVE-2025-11523 2025-10-09 2025-10-09 6.3 6.5 Likely
CVE-2025-11524 2025-10-09 2025-10-09 8.8 9.0 Likely
CVE-2025-11525 2025-10-09 2025-10-09 8.8 9.0 Likely
CVE-2025-11526 2025-10-09 2026-02-24 8.8 9.0 Likely
CVE-2025-11527 2025-10-09 2026-02-24 8.8 9.0 Likely
CVE-2025-11528 2025-10-09 2025-10-09 8.8 9.0 Likely
CVE-2025-11586 2025-10-10 2025-10-20 8.8 9.0 Likely
CVE-2026-24426 2026-02-03 2026-02-10 6.1 - -
CVE-2026-24427 2026-02-03 2026-02-10 5.5 - -
CVE-2026-24434 2026-02-03 2026-02-10 6.5 - -
CVE-2026-24441 2026-02-03 2026-02-10 5.9 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for tenda ac7_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.