Description
A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing manipulation of the argument Cookie can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Problem types
Product status
Timeline
| 2025-12-29: | Advisory disclosed |
| 2025-12-29: | VulDB entry created |
| 2025-12-29: | VulDB entry last update |
Credits
dwbruijn (VulDB User)
References
github.com/.../CVEs/blob/main/Tenda/R7WebsSecurityHandler.md
vuldb.com/?id.338645 (VDB-338645 | Tenda W6-S R7websSsecurityHandler httpd stack-based overflow)
vuldb.com/?ctiid.338645 (VDB-338645 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.725500 (Submit #725500 | Tenda W6-S V1.0.0.4(510) Stack-based Buffer Overflow)
github.com/.../CVEs/blob/main/Tenda/R7WebsSecurityHandler.md
www.tenda.com.cn/
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.