Description
A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw is in the fromWizardHandle function of the /goform/WizardHandle component in the Tenda AC6 firmware. A crafted POST request that manipulates the WANT/WANS argument can trigger a stack‑based buffer overflow, potentially allowing arbitrary code execution on the router. The issue is a classic stack overflow vulnerability (CWE‑119, CWE‑121, CWE‑787) that is exploitable remotely through the web interface.

Affected Systems

The vulnerable product is the Tenda AC6 router, specifically the firmware version 15.03.05.16. Only this version is confirmed; no other firmware releases are known to contain the flaw from the provided data.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1 % suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can target the router from a remote network by sending a malicious POST to /goform/WizardHandle; no privileged access is required, making the exploit straightforward.

Generated by OpenCVE AI on April 1, 2026 at 06:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a version that includes the fix for the fromWizardHandle buffer overflow.
  • Verify that the device is running the updated firmware version before proceeding.
  • If a firmware upgrade is delayed, block external access to the router’s management interface to prevent remote manipulation of the WizardHandle endpoint.
  • Monitor router logs for unusual POST requests to /goform/WizardHandle and apply network segmentation or firewall rules to limit exposure.

Generated by OpenCVE AI on April 1, 2026 at 06:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac6
Vendors & Products Tenda ac6

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB. A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Title Tenda AC6 POST Request WizardHandle fromWizardHandle stack-based overflow
First Time appeared Tenda
Tenda ac6 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ac6_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac6 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T22:07:09.941Z

Reserved: 2026-03-27T08:10:29.177Z

Link: CVE-2026-4960

cve-icon Vulnrichment

Updated: 2026-03-27T18:50:51.970Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T17:16:30.750

Modified: 2026-03-31T20:58:48.450

Link: CVE-2026-4960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:55:33Z

Weaknesses