Daily CVE Report: Zero New Vulnerabilities Published, Tenda & UTT Flaws Highlight Persistent IoT Risk
For the first time in the reporting period, zero new CVEs were published in the last 24 hours, a notable lull in the constant stream of disclosed vulnerabilities. However, the report underscores that the threat landscape remains active, with several high-severity flaws in widely deployed consumer networking equipment persisting as active risks. The absence of new entries does not signal safety but rather a momentary pause, with existing vulnerabilities in devices from manufacturers like Tenda and UTT continuing to pose significant exposure for home and small office networks.
The report details multiple HIGH-severity vulnerabilities, all scored under the newer CVSSv4 standard. Two critical flaws, CVE-2026-5548 and CVE-2026-5550, both with a CVSS score of 8.7, affect Tenda AC10 routers running firmware version 16.03.10.10_multi_TDE01. The vulnerabilities reside in the `fromSysToolChangePwd` function within the `/bin/httpd` binary, with one leading to a stack-based buffer overflow—a classic and often exploitable memory corruption issue. A separate 7.4 HIGH-severity flaw, CVE-2026-5544, was identified in UTT HiPER 1250GW gateways up to version 3.2.7-210907-180535.
Despite their high severity scores, the Exploit Prediction Scoring System (EPSS) percentages for these flaws are currently low, ranging from 0.04% to 0.05%. This indicates a perceived lower likelihood of widespread exploitation in the wild within the next 30 days. However, this statistical model does not eliminate the risk, especially for unpatched devices on public-facing networks. The concentration of vulnerabilities in consumer-grade routers from specific manufacturers highlights a persistent sector-wide challenge in IoT security, where patch deployment is often slow or non-existent, leaving millions of devices potentially exposed to remote attacks that could lead to network compromise.