A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function formWifiWpsOOB of the file /goform/WifiWpsOOB of the component POST Request Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://lavender-bicycle-a5a.notion.site/Tenda_AC5_WifiWpsOOB_index-32053a41781f8096a9b6e48177c25eb0?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.353656 | Permissions Required VDB Entry |
| https://vuldb.com/?id.353656 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.777393 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
31 Mar 2026, 20:59
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:tenda:ac5_firmware:15.03.06.47:*:*:*:*:*:*:* cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:* |
|
| References | () https://lavender-bicycle-a5a.notion.site/Tenda_AC5_WifiWpsOOB_index-32053a41781f8096a9b6e48177c25eb0?source=copy_link - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.353656 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.353656 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.777393 - Third Party Advisory, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product | |
| First Time |
Tenda
Tenda ac5 Firmware Tenda ac5 |
|
| CWE | CWE-787 |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Mar 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 00:16
Updated : 2026-03-31 20:59
NVD link : CVE-2026-4905
Mitre link : CVE-2026-4905
CVE.ORG link : CVE-2026-4905
JSON object : View
Products Affected
tenda
- ac5
- ac5_firmware
