Description
A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. Such manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate patch
AI Analysis

Impact

The vulnerability resides in the formSetCfm routine of the Tenda AC5 firmware, which improperly processes the funcpara1 argument sent in a POST request to /goform/setcfm. The lack of bounds checking leads to a stack‑based buffer overflow that can be triggered remotely. Successful exploitation allows an attacker to overwrite stack data and potentially execute arbitrary code.

Affected Systems

The affected device is the Tenda AC5 wireless router running firmware version 15.03.06.47. No other firmware releases are listed as vulnerable in the advisory.

Risk and Exploitability

The CVSS base score of 8.7 signals a high‑severity risk. The exploit has been publicly disclosed and can be launched over the network by sending a crafted POST request to /goform/setcfm. Because the EPSS score is not available, the exact likelihood is unknown, but the known public availability of an exploit and lack of a workaround suggest a significant threat. The vulnerability is not catalogued in the CISA KEV list.

Generated by OpenCVE AI on March 27, 2026 at 07:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether your Tenda AC5 router is running firmware 15.03.06.47, and if so, download the latest firmware from the manufacturer’s website.
  • Apply the firmware update to the router, following the vendor’s instructions, to remove the stack‑based buffer overflow in /goform/setcfm.
  • If a patch is not yet available, configure the router or network firewall to block or restrict HTTP POST traffic to the /goform/setcfm endpoint.
  • Monitor router logs for suspicious POST requests targeting /goform/setcfm and investigate any anomalies.
  • Keep the router’s firmware up to date regularly to protect against future vulnerabilities.

Generated by OpenCVE AI on March 27, 2026 at 07:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac5
Vendors & Products Tenda ac5

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. Such manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Title Tenda AC5 POST Request setcfm formSetCfm stack-based overflow
First Time appeared Tenda
Tenda ac5 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ac5_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac5 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T23:11:07.350Z

Reserved: 2026-03-26T15:57:56.353Z

Link: CVE-2026-4904

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T00:16:24.170

Modified: 2026-03-27T00:16:24.170

Link: CVE-2026-4904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:51Z

Weaknesses