Home

Description

A security flaw has been discovered in Tenda AC6 15.03.06.49_multi_TDE01. Affected is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet of the component httpd. Performing a manipulation of the argument mac/ssid results in os command injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

PUBLISHED Reserved 2026-05-10 | Published 2026-05-11 | Updated 2026-05-11 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 4.7CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
5.8AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

OS Command Injection

Command Injection

Product status

15.03.06.49_multi_TDE01
affected

Timeline

2026-05-10:Advisory disclosed
2026-05-10:VulDB entry created
2026-05-10:VulDB entry last update

Credits

ST4R (VulDB User) reporter

References

vuldb.com/vuln/362560 (VDB-362560 | Tenda AC6 httpd WifiExtraSet fromSetWirelessRepeat os command injection) vdb-entry technical-description

vuldb.com/vuln/362560/cti (VDB-362560 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/810074 (Submit #810074 | Tenda AC6 V2.0 (AC1206) Firmware V15.03.06.23 Command Injection via mac/ssid) third-party-advisory

github.com/...blob/main/Tenda/AC10U/fromSetWirelessRepeat.md exploit

www.tenda.com.cn/ product

cve.org (CVE-2026-8263)

nvd.nist.gov (CVE-2026-8263)

Download JSON