Description
A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
Published: 2026-03-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow is found in the POST Request Handler of the Tenda AC5 router. The flaw lies in the handling of the "page" argument within the fromAddressNat function, allowing a crafted payload sent through the /goform/addressNat endpoint to overflow the stack. Attackers can remotely exploit this to potentially execute arbitrary code or crash the device.

Affected Systems

The vulnerability affects the Tenda AC5 router, specifically firmware version 15.03.06.47. This build is known to be vulnerable; newer firmware releases may have addressed the issue. Users who have not updated remain exposed to the flaw through the router’s NAT configuration interface.

Risk and Exploitability

The CVSS score of 8.7 classifies the issue as high severity, while the EPSS score is below 1 %, indicating a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, but a public exploit has been released. Attackers can initiate the attack remotely via the WAN interface, making any device exposing the /goform/addressNat POST endpoint to the internet at risk.

Generated by OpenCVE AI on March 31, 2026 at 06:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tenda AC5 firmware to the latest version available on the official Tenda website.
  • If a patch is not yet available, disable remote management or block external access to the /goform/addressNat endpoint.
  • Verify that the device no longer accepts vulnerable POST requests and monitor network traffic for abnormal activity.
  • Apply network segmentation or a firewall to limit inbound traffic to the router.

Generated by OpenCVE AI on March 31, 2026 at 06:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac5_firmware:15.03.06.47:*:*:*:*:*:*:*

Fri, 27 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac5
Vendors & Products Tenda ac5

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
Title Tenda AC5 POST Request addressNat fromAddressNat memory corruption
First Time appeared Tenda
Tenda ac5 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ac5_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac5 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T13:54:48.568Z

Reserved: 2026-03-26T15:57:49.630Z

Link: CVE-2026-4902

cve-icon Vulnrichment

Updated: 2026-03-27T13:29:22.002Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T23:16:21.090

Modified: 2026-03-31T01:36:18.920

Link: CVE-2026-4902

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:01:27Z

Weaknesses