Impact
A stack-based buffer overflow is found in the POST Request Handler of the Tenda AC5 router. The flaw lies in the handling of the "page" argument within the fromAddressNat function, allowing a crafted payload sent through the /goform/addressNat endpoint to overflow the stack. Attackers can remotely exploit this to potentially execute arbitrary code or crash the device.
Affected Systems
The vulnerability affects the Tenda AC5 router, specifically firmware version 15.03.06.47. This build is known to be vulnerable; newer firmware releases may have addressed the issue. Users who have not updated remain exposed to the flaw through the router’s NAT configuration interface.
Risk and Exploitability
The CVSS score of 8.7 classifies the issue as high severity, while the EPSS score is below 1 %, indicating a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, but a public exploit has been released. Attackers can initiate the attack remotely via the WAN interface, making any device exposing the /goform/addressNat POST endpoint to the internet at risk.
OpenCVE Enrichment