Impact
A stack‑based buffer overflow exists in the formWifiWpsOOB handler of the Tenda AC5 firmware. By manipulating the index argument of a POST request to /goform/WifiWpsOOB, an attacker can cause a memory corruption that potentially allows arbitrary code execution. The vulnerability is high‑severity, with a CVSS score of 8.7, and the public exploit demonstrates remote exploitation capabilities. Successful exploitation would enable an attacker to gain full control of the device, compromising confidentiality, integrity, and availability of the network environment.
Affected Systems
The flaw affects Tenda AC5 units running firmware version 15.03.06.47. This firmware is listed in the Common Platform Enumeration as part of the Tenda AC5 product line.
Risk and Exploitability
The CVSS score of 8.7 indicates a high impact if exploited, while the EPSS score of less than 1% suggests that the likelihood of exploitation in the wild is low at present. The vulnerability is not yet listed in the CISA KEV catalog, but it has been publicly disclosed and an exploit has been shared. The attack vector is inferred to be remote, requiring an attacker to send a crafted HTTP POST request to the device's administrative interface. Any user with network access to the router’s management port could potentially execute the exploit.
OpenCVE Enrichment