A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing manipulation of the argument Cookie can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
References
| Link | Resource |
|---|---|
| https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338645 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338645 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.725500 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
| https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
02 Jan 2026, 21:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.338645 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.338645 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.725500 - Third Party Advisory, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product | |
| CPE | cpe:2.3:o:tenda:w6-s_firmware:1.0.0.4\(510\):*:*:*:*:*:*:* cpe:2.3:h:tenda:w6-s:-:*:*:*:*:*:*:* |
|
| First Time |
Tenda
Tenda w6-s Tenda w6-s Firmware |
30 Dec 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.md - |
30 Dec 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-30 16:15
Updated : 2026-01-02 21:20
NVD link : CVE-2025-15255
Mitre link : CVE-2025-15255
CVE.ORG link : CVE-2025-15255
JSON object : View
Products Affected
tenda
- w6-s_firmware
- w6-s
