A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
References
| Link | Resource |
|---|---|
| https://lavender-bicycle-a5a.notion.site/Tenda_AC5_WizardHandle_PPW-32053a41781f80cab094d750d30dc9a8?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.353657 | Permissions Required VDB Entry |
| https://vuldb.com/?id.353657 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.777394 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
31 Mar 2026, 20:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lavender-bicycle-a5a.notion.site/Tenda_AC5_WizardHandle_PPW-32053a41781f80cab094d750d30dc9a8?source=copy_link - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.353657 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.353657 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.777394 - Third Party Advisory, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product | |
| CWE | CWE-787 | |
| CPE | cpe:2.3:o:tenda:ac5_firmware:15.03.06.47:*:*:*:*:*:*:* cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:* |
|
| First Time |
Tenda
Tenda ac5 Firmware Tenda ac5 |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Mar 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 01:16
Updated : 2026-03-31 20:58
NVD link : CVE-2026-4906
Mitre link : CVE-2026-4906
CVE.ORG link : CVE-2026-4906
JSON object : View
Products Affected
tenda
- ac5
- ac5_firmware
