First published: Fri Apr 07 2023(Updated: )
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the formSetFirewallCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac5 Firmware | =15.03.06.28 | |
Tenda AC5 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25216 is a vulnerability found in Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 firmware that allows for a stack overflow via the formSetFirewallCfg function, leading to a Denial of Service (DoS) or arbitrary code execution.
CVE-2023-25216 has a severity rating of 9.8, which is considered critical.
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 firmware with version 15.03.06.28 is affected by CVE-2023-25216.
CVE-2023-25216 allows attackers to cause a Denial of Service (DoS) or execute arbitrary code by exploiting the stack overflow vulnerability in Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 firmware.
At the moment, there is no known fix or patch for CVE-2023-25216. It is recommended to update to a newer firmware version when one becomes available.