A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src/mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
References
| Link | Resource |
|---|---|
| https://github.com/wy876/cve/issues/5 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.290862 | Permissions Required VDB Entry |
| https://vuldb.com/?id.290862 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.477048 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-01-09 11:15
Updated : 2025-03-22 09:15
NVD link : CVE-2025-0349
Mitre link : CVE-2025-0349
CVE.ORG link : CVE-2025-0349
JSON object : View
Products Affected
tenda
- ac6_firmware
- ac6
