Impact
The flaw is in the fromWizardHandle function of the /goform/WizardHandle component in the Tenda AC6 firmware. A crafted POST request that manipulates the WANT/WANS argument can trigger a stack‑based buffer overflow, potentially allowing arbitrary code execution on the router. The issue is a classic stack overflow vulnerability (CWE‑119, CWE‑121, CWE‑787) that is exploitable remotely through the web interface.
Affected Systems
The vulnerable product is the Tenda AC6 router, specifically the firmware version 15.03.05.16. Only this version is confirmed; no other firmware releases are known to contain the flaw from the provided data.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1 % suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can target the router from a remote network by sending a malicious POST to /goform/WizardHandle; no privileged access is required, making the exploit straightforward.
OpenCVE Enrichment