Impact
A stack‑based buffer overflow has been found in the decodePwd function of the /goform/WizardHandle POST request handler on Tenda AC5 routers. The flaw is triggered by manipulating the WANT/WANS parameter and can be invoked from a remote attacker. If successfully exploited, the overflow could corrupt stack data and lead to arbitrary code execution or other destructive actions on the device.
Affected Systems
The vulnerability affects Tenda AC5 routers running firmware version 15.03.06.47. The flaw resides in the ac5_firmware component, meaning all units with this firmware are at risk until a patch that removes the stack‑overflow in decodePwd is deployed.
Risk and Exploitability
The CVSS score of 8.7 categorizes the issue as high severity. EPSS information is not available, and the flaw is not listed in the CISA KEV catalog, yet it has been publicly disclosed and the description confirms that remote exploitation is possible. While no specific exploit code is published, a determined attacker could achieve remote code execution by triggering the buffer overflow.
OpenCVE Enrichment