CVE-2026-21668 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 12, 2026
Backup Repository - Broken Access Control
Overview
Backup Repository contains a broken access control vulnerability caused by insufficient restriction enforcement, letting authenticated domain users manipulate arbitrary files.
Severity & Score
Impact
Authenticated domain users can manipulate arbitrary files, potentially leading to data tampering or system compromise.
Mitigation
Update to the latest version with access control fixes.
References
Social Media Activity(4 posts)
š CVE-2026-21668 - High (8.8) A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository. š https://www.thehackerwire.com/vulnerability/CVE-2026-21668/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-21668 - High (8.8) A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository. š https://www.thehackerwire.com/vulnerability/CVE-2026-21668/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-21668 - High (8.8) A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository. š https://www.thehackerwire.com/vulnerability/CVE-2026-21668/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-21668 - High (8.8) A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository. š https://www.thehackerwire.com/vulnerability/CVE-2026-21668/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-21668
- Severity
- High
- CVSS Score
- 8.8
- Type
- broken_access_control
- Status
- unconfirmed
- EPSS
- 3.9%
- Social Posts
- 4
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H