Impact
Tenda AC10 firmware includes a stack-based buffer overflow in the httpd fromSysToolChangePwd function. The vulnerability is triggered by manipulating the sys.userpass argument, allowing an attacker to overflow the stack. If successfully exploited, the attacker could execute arbitrary code on the device with the privileges of the httpd process, compromising confidentiality, integrity, and availability.
Affected Systems
The flaw affects the Tenda AC10 router running firmware version 16.03.10.10_multi_TDE01. Any device of this model and firmware should be considered vulnerable until a patch is applied.
Risk and Exploitability
The CVSS base score of 8.7 indicates high severity. Although EPSS data is missing and the weakness is not listed in KEV, the remote attack vector and lack of mitigation substantially raise the risk level. Exploitation requires the ability to send crafted requests to the device’s httpd service, which is typically reachable from the local network, creating a realistic threat for exposed or misconfigured devices.
OpenCVE Enrichment