A vulnerability has been found in Tenda AC6 15.03.06.50. This issue affects some unknown processing of the file /goform/WifiGuestSet of the component HTTP Request Handler. Such manipulation of the argument shareSpeed leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 28 Oct 2025 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac6 Firmware
CPEs cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac6_firmware:15.03.06.50:*:*:*:*:*:*:*
Vendors & Products Tenda ac6 Firmware

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac6
Vendors & Products Tenda
Tenda ac6

Mon, 27 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda AC6 15.03.06.50. This issue affects some unknown processing of the file /goform/WifiGuestSet of the component HTTP Request Handler. Such manipulation of the argument shareSpeed leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Title Tenda AC6 HTTP Request WifiGuestSet stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-10-27T20:06:53.554Z

Reserved: 2025-10-25T16:55:00.619Z

Link: CVE-2025-12225

cve-icon Vulnrichment

Updated: 2025-10-27T20:06:48.519Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-27T05:15:38.403

Modified: 2025-10-28T02:21:08.503

Link: CVE-2025-12225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-27T22:04:20Z