CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been declared as critical. This vulnerability affects the function formsetschedled of the file /goform/SetLEDCf of the component HTTP POST Request Handler. The manipulation of the argument Time leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in Tenda AC15 firmware version 15.03.05.19_multi affecting the HTTP POST request handler's LED configuration function. An authenticated remote attacker can exploit improper input validation on the 'Time' parameter to achieve buffer overflow, leading to complete system compromise including confidentiality, integrity, and availability violations. Public exploit code has been disclosed and the vulnerability meets criteria for active exploitation risk.
Technical Context
The vulnerability exists in the formsetschedled function of the /goform/SetLEDCf HTTP POST handler in Tenda AC15 wireless router firmware. This represents a classic CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) condition where user-supplied input on the 'Time' parameter is not properly validated before being written to a fixed-size buffer. Tenda AC15 devices use embedded HTTP servers to handle router configuration requests; the vulnerable endpoint processes LED scheduling parameters without adequate bounds checking. The CPE context implies this affects Tenda AC15 devices running firmware version 15.03.05.19_multi or potentially other 15.03.05.x releases. The HTTP POST request handler is a core component of the web-based management interface, making this remotely exploitable from the network.
Affected Products
AC15 (['15.03.05.19_multi'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17414