Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mcgx-8v57-hq28

Опубликовано: 27 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

EPSS

Процентиль: 23%
0.00079
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
12 дней назад

A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

EPSS

Процентиль: 23%
0.00079
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-787