A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing manipulation of the argument Cookie can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
References
| Link | Resource |
|---|---|
| https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338645 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338645 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.725500 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
| https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-30 16:15
Updated : 2026-01-02 21:20
NVD link : CVE-2025-15255
Mitre link : CVE-2025-15255
CVE.ORG link : CVE-2025-15255
JSON object : View
Products Affected
tenda
- w6-s_firmware
- w6-s
