CVE-2026-4960

A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*

History

31 Mar 2026, 20:58

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*
First Time Tenda
Tenda ac6 Firmware
Tenda ac6
References () https://lavender-bicycle-a5a.notion.site/Tenda-AC6-WizardHandle-32053a41781f800eb05feb16885747f7?source=copy_link - () https://lavender-bicycle-a5a.notion.site/Tenda-AC6-WizardHandle-32053a41781f800eb05feb16885747f7?source=copy_link - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.353837 - () https://vuldb.com/?ctiid.353837 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.353837 - () https://vuldb.com/?id.353837 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.777616 - () https://vuldb.com/?submit.777616 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

27 Mar 2026, 23:17

Type Values Removed Values Added
Summary (en) A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB. (en) A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

27 Mar 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 17:16

Updated : 2026-03-31 20:58


NVD link : CVE-2026-4960

Mitre link : CVE-2026-4960

CVE.ORG link : CVE-2026-4960


JSON object : View

Products Affected

tenda

  • ac6_firmware
  • ac6
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write