Impact
The Tenda AC15 router exposes a /goform/TextEditingConversion endpoint that is vulnerable to a stack-based buffer overflow when an attacker supplies a malicious wpapsk_crypto2_4g argument. The overflow corrupts the device’s stack, and based on the description, it is inferred that this flaw could allow an attacker to execute arbitrary code on the router. The vulnerability can be triggered remotely through the administrative interface, and exploit code has already been released publicly.
Affected Systems
This vulnerability affects Tenda AC15 routers running firmware versions up to and including 15.13.07.13. Any device operating with this firmware or an earlier release is susceptible to the buffer overflow.
Risk and Exploitability
The issue carries a CVSS score of 8.7, indicating a high severity impact. The EPSS score is less than 1 %, reflecting a low current probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Because the flaw can be exploited remotely and the exploit is publicly available, attackers could potentially launch attacks from any network that can reach the router’s management interface.
OpenCVE Enrichment