Vulnerability Description
A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing a manipulation of the argument Cookie can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | W6-S Firmware | 1.0.0.4\(510\) |
| Tenda | W6-S | - |
Related Weaknesses (CWE)
References
- https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.338645Permissions RequiredVDB Entry
- https://vuldb.com/?id.338645Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.725500Third Party AdvisoryVDB Entry
- https://www.tenda.com.cn/Product
- https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.mdExploitThird Party Advisory
FAQ
What is CVE-2025-15255?
CVE-2025-15255 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing a manipulation of the argument Coo...
How severe is CVE-2025-15255?
CVE-2025-15255 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-15255?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda W6-S Firmware, Tenda W6-S.