Impact
The vulnerability resides in the formSetCfm routine of the Tenda AC5 firmware, which improperly processes the funcpara1 argument sent in a POST request to /goform/setcfm. The lack of bounds checking leads to a stack‑based buffer overflow that can be triggered remotely. Successful exploitation allows an attacker to overwrite stack data and potentially execute arbitrary code.
Affected Systems
The affected device is the Tenda AC5 wireless router running firmware version 15.03.06.47. No other firmware releases are listed as vulnerable in the advisory.
Risk and Exploitability
The CVSS base score of 8.7 signals a high‑severity risk. The exploit has been publicly disclosed and can be launched over the network by sending a crafted POST request to /goform/setcfm. Because the EPSS score is not available, the exact likelihood is unknown, but the known public availability of an exploit and lack of a workaround suggest a significant threat. The vulnerability is not catalogued in the CISA KEV list.
OpenCVE Enrichment