Impact
A Tenda AC5 router running firmware 15.03.06.47 is vulnerable to a stack-based buffer overflow triggered by a specially crafted POST request to the /goform/setcfm endpoint. By manipulating the funcpara1 argument the attacker can overflow a stack buffer and potentially execute arbitrary code, giving remote control of the device and compromising confidentiality, integrity, and availability. The weakness involves out‑of‑bounds writes (CWE‑119, CWE‑121, CWE‑787).
Affected Systems
Affected are Tenda AC5 routers. The vulnerable firmware is version 15.03.06.47. No other firmware versions are listed as affected.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity vulnerability, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not currently listed in the CISA KEV catalog. However, the public disclosure of exploits means that remote attackers can reach the device over the network via an HTTP POST request to /goform/setcfm, so the risk remains if the device is exposed.
OpenCVE Enrichment