Impact
The Tenda AC6 router, firmware version 15.03.05.16_multi, suffers from a buffer overflow in the formSetCfm function. The vulnerability is triggered when an attacker supplies malicious values for the funcname, funcpara1, and funcpara2 parameters, which are insufficiently validated before being copied into a fixed-size buffer. If an attacker can influence the size or contents of these inputs, the overflow may corrupt adjacent memory, allowing arbitrary code execution or denial-of-service on the device.
Affected Systems
This issue affects the Tenda AC6 router running firmware 15.03.05.16_multi. No other vendors or product variations are listed, and no detailed version range is available from the CNA data.
Risk and Exploitability
The vulnerability is high severity due to the buffer overflow, a well-known vector for remote code execution. While EPSS data is not provided and the issue is not listed in KEV, the lack of input validation implies that exploitation could be straightforward if an attacker can reach the affected function, likely through crafted HTTP requests to the router's web interface. The attack would require network connectivity to the device and knowledge of the vulnerable endpoint; once leveraged, it could give an attacker full control of the router.
OpenCVE Enrichment