Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cfmp-f27r-2qg4

Опубликовано: 27 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

EPSS

Процентиль: 23%
0.00079
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
13 дней назад

A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

EPSS

Процентиль: 23%
0.00079
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-787