8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Tenda AC5 POST Request WizardHandle decodePwd stack-based overflow
A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
References
-
VDB-353657 | Tenda AC5 POST Request WizardHandle decodePwd stack-based overflow vdb-entrytechnical-description
-
-
Submit #777394 | Tenda AC5 AC5 V1.0 V15.03.06.47 Buffer Overflow third-party-advisory
-
https://www.tenda.com.cn/ product
Affected products
- ==15.03.06.47
Matching in nixpkgs
pkgs.vimPlugins.nvim-treesitter-parsers.gren
Tree-sitter grammar for gren
-
nixos-unstable 0.0.0+rev=c36aac5
- nixpkgs-unstable 0.0.0+rev=c36aac5
- nixos-unstable-small 0.0.0+rev=c36aac5
-
nixos-unstable tools_r30.0.3-macosx.zip
- nixpkgs-unstable tools_r30.0.3-macosx.zip
- nixos-unstable-small tools_r30.0.3-macosx.zip
-
nixos-25.11 tools_r30.0.3-macosx.zip
- nixos-25.11-small tools_r30.0.3-macosx.zip
- nixpkgs-25.11-darwin tools_r30.0.3-macosx.zip