Impact
The vulnerability is an OS command injection flaw in the get_log_file endpoint of Tenda AC6’s web interface. By manipulating the wans.flag parameter in the /goform/getLogFile request, an attacker can execute arbitrary shell commands on the device. This allows full control over the router operating system, compromising confidentiality, integrity, and availability of the network services. The flaw aligns with CWE-77 (OS Command Injection) and CWE-78 (Command Injection).
Affected Systems
The affected device is the Tenda AC6 router with firmware 15.03.06.23. No other versions or models are listed in the current data.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. It can be triggered remotely by sending a crafted request to the web interface, making it reachable over the internet. Public disclosures indicate that exploit code is available and could be used by attackers.
OpenCVE Enrichment