Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB. | |
| Title | Tenda AC6 POST Request WizardHandle fromWizardHandle stack-based overflow | |
| First Time appeared |
Tenda
Tenda ac6 Firmware |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:o:tenda:ac6_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda ac6 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-27T19:57:46.381Z
Reserved: 2026-03-27T08:10:29.177Z
Link: CVE-2026-4960
Updated: 2026-03-27T18:50:51.970Z
Status : Received
Published: 2026-03-27T17:16:30.750
Modified: 2026-03-27T17:16:30.750
Link: CVE-2026-4960
No data.
OpenCVE Enrichment
Updated: 2026-03-27T20:28:14Z