Impact
The vulnerability is a classic buffer overflow in the addWifiMacFilter function of Tenda AC6 firmware version 15.03.05.16_multi. The flaw originates from improper handling of the deviceId parameter, allowing an attacker to send an oversized value that overwrites memory adjacent to the buffer. This can lead to arbitrary code execution or denial of service if exploited successfully, as the corrupted memory region may contain executable code or control data.
Affected Systems
Affected by this flaw are Tenda AC6 routers running firmware 15.03.05.16_multi. The vulnerability is present whenever the addWifiMacFilter API is exposed, which typically occurs when the device has remote management enabled or when LAN hosts communicate with the router to configure Wi‑Fi settings.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. The EPSS score of less than 1% suggests that, at the time of this analysis, the likelihood of public exploitation is very low. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote via network traffic sent to the router’s API, requiring no local access or privileged credentials.
OpenCVE Enrichment
EUVD