Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tenda:ac6_firmware:*:*:*:*:*:*:*:* |
Tue, 28 Oct 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac6 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac6_firmware:15.03.06.50:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac6 Firmware
|
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac6 |
|
| Vendors & Products |
Tenda
Tenda ac6 |
Mon, 27 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Tenda AC6 15.03.06.50. This issue affects some unknown processing of the file /goform/WifiGuestSet of the component HTTP Request Handler. Such manipulation of the argument shareSpeed leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda AC6 HTTP Request WifiGuestSet stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T07:06:42.550Z
Reserved: 2025-10-25T16:55:00.619Z
Link: CVE-2025-12225
Updated: 2025-10-27T20:06:48.519Z
Status : Analyzed
Published: 2025-10-27T05:15:38.403
Modified: 2025-10-28T02:21:08.503
Link: CVE-2025-12225
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:04:20Z