CVE-2026-6016

A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Performing a manipulation of the argument WANS results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac9_firmware:15.03.02.13:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*

History

30 Apr 2026, 13:59

Type Values Removed Values Added
References () https://lavender-bicycle-a5a.notion.site/Tenda-AC9-WizardHandle-33153a41781f808480f9e3b78ce438e0?source=copy_link - () https://lavender-bicycle-a5a.notion.site/Tenda-AC9-WizardHandle-33153a41781f808480f9e3b78ce438e0?source=copy_link - Exploit, Third Party Advisory
References () https://vuldb.com/submit/791829 - () https://vuldb.com/submit/791829 - Third Party Advisory, VDB Entry
References () https://vuldb.com/vuln/356572 - () https://vuldb.com/vuln/356572 - Third Party Advisory, VDB Entry
References () https://vuldb.com/vuln/356572/cti - () https://vuldb.com/vuln/356572/cti - Permissions Required, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
First Time Tenda
Tenda ac9
Tenda ac9 Firmware
CPE cpe:2.3:o:tenda:ac9_firmware:15.03.02.13:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*

10 Apr 2026, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 06:16

Updated : 2026-04-30 13:59


NVD link : CVE-2026-6016

Mitre link : CVE-2026-6016

CVE.ORG link : CVE-2026-6016


JSON object : View

Products Affected

tenda

  • ac9
  • ac9_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow