A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB. | |
| Title | Tenda AC6 POST Request WizardHandle fromWizardHandle stack-based overflow | |
| First Time appeared |
Tenda
Tenda ac6 Firmware |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:o:tenda:ac6_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda ac6 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-27T16:09:34.784Z
Reserved: 2026-03-27T08:10:29.177Z
Link: CVE-2026-4960
No data.
Status : Received
Published: 2026-03-27T17:16:30.750
Modified: 2026-03-27T17:16:30.750
Link: CVE-2026-4960
No data.
OpenCVE Enrichment
No data.