A vulnerability was found in Tenda AC9 15.03.02.13. It has been rated as critical. This issue affects the function formSetIptv of the file /goform/SetIPTVCfg of the component POST Request Handler. The manipulation of the argument list leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://candle-throne-f75.notion.site/Tenda-AC9-formSetIptv-209df0aa11858061ae2bcbf83918d034 | Exploit Third Party Advisory |
https://candle-throne-f75.notion.site/Tenda-AC9-formSetIptv-209df0aa11858061ae2bcbf83918d034 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.311579 | Permissions Required |
https://vuldb.com/?id.311579 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.591363 | Third Party Advisory VDB Entry |
https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
09 Jun 2025, 19:07
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tenda ac9 Firmware
Tenda Tenda ac9 |
|
CPE | cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac9_firmware:15.03.2.13:*:*:*:*:*:*:* |
|
References | () https://www.tenda.com.cn/ - Product | |
References | () https://candle-throne-f75.notion.site/Tenda-AC9-formSetIptv-209df0aa11858061ae2bcbf83918d034 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?id.311579 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.591363 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?ctiid.311579 - Permissions Required |
09 Jun 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
07 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-07 14:15
Updated : 2025-06-09 19:07
NVD link : CVE-2025-5836
Mitre link : CVE-2025-5836
JSON object : View
Products Affected
tenda
- ac9
- ac9_firmware
CWE
No CWE.