Impact
A stack-based buffer overflow exists in the Tenda AC9 firmware within the POST request handler for the QuickIndex form. By sending a crafted PPPOEPassword field to the /goform/QuickIndex endpoint, an attacker can corrupt the stack on the device’s processor, a flaw classified as CWE‑119 and CWE‑121. The vulnerability is publicly disclosed and allows remote exploitation, potentially leading to arbitrary code execution on the router.
Affected Systems
Devices running the Tenda AC9 firmware version 15.03.02.13 are affected. The flaw resides in the AC9 product line and manifests when the QuickIndex form is accessed via HTTP POST.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.7, indicating high severity. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, but the public disclosure and remote attack vector via the QuickIndex endpoint suggest that attackers could target the device from a network that can reach its management interface.
OpenCVE Enrichment