Home

Description

EN DE

A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src/mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Es wurde eine kritische Schwachstelle in Tenda AC6 15.03.05.16 entdeckt. Es geht dabei um die Funktion GetParentControlInfo der Datei /goform/GetParentControlInfo. Dank der Manipulation des Arguments src/mac mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-01-08 | Published 2025-01-09 | Updated 2025-03-22 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C

Problem types

Stack-based Buffer Overflow

Memory Corruption

Product status

15.03.05.16
affected

Timeline

2025-01-08:Advisory disclosed
2025-01-08:VulDB entry created
2025-03-22:VulDB entry last update

Credits

WY596 (VulDB User) reporter

References

vuldb.com/?id.290862 (VDB-290862 | Tenda AC6 GetParentControlInfo stack-based overflow) vdb-entry technical-description

vuldb.com/?ctiid.290862 (VDB-290862 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.477048 (Submit #477048 | tenda AC6 V15.03.05.16 Buffer Overflow) third-party-advisory

github.com/wy876/cve/issues/5 exploit issue-tracking

www.tenda.com.cn/ product

cve.org (CVE-2025-0349)

nvd.nist.gov (CVE-2025-0349)

Download JSON