Impact
The vulnerability is a stack‑based buffer overflow in the fromSysToolChangePwd function of the Tenda AC10 httpd binary, which can be triggered by a crafted request. The flaw is linked to CWE‑119 and CWE‑121, allowing an attacker to potentially execute arbitrary code or crash the service. The result is a compromise of confidentiality, integrity, and availability of the device.
Affected Systems
Affected are Tenda AC10 routers running firmware version 16.03.10.10_multi_TDE01. The issue resides in the /bin/httpd binary exposed through the web management interface, and multiple points of entry may be impacted.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, and the flaw can be exploited remotely without local access. EPSS data is unavailable and the vulnerability is not listed in CISA’s KEV catalog, so the risk remains high until a patch is applied. An attacker would need to send a crafted request to the httpd service to trigger the overflow.
OpenCVE Enrichment