A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Performing a manipulation of the argument WANS results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://lavender-bicycle-a5a.notion.site/Tenda-AC9-WizardHandle-33153a41781f808480f9e3b78ce438e0?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/submit/791829 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/356572 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/356572/cti | Permissions Required VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Apr 2026, 13:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lavender-bicycle-a5a.notion.site/Tenda-AC9-WizardHandle-33153a41781f808480f9e3b78ce438e0?source=copy_link - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/791829 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/356572 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/356572/cti - Permissions Required, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product | |
| First Time |
Tenda
Tenda ac9 Tenda ac9 Firmware |
|
| CPE | cpe:2.3:o:tenda:ac9_firmware:15.03.02.13:*:*:*:*:*:*:* cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:* |
10 Apr 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 06:16
Updated : 2026-04-30 13:59
NVD link : CVE-2026-6016
Mitre link : CVE-2026-6016
CVE.ORG link : CVE-2026-6016
JSON object : View
Products Affected
tenda
- ac9
- ac9_firmware
