Vulnerability Description
A security vulnerability has been detected in Tenda AC6 15.03.06.23. Affected by this issue is the function get_log_file of the file /goform/getLogFile of the component httpd. The manipulation of the argument wans.flag leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac6 Firmware | 15.03.06.23 |
| Tenda | Ac6 | 2.0 |
Related Weaknesses (CWE)
References
- https://github.com/dxz0069/WAVLINK-WN530H4-Command-Injection-in-set_add_routing/ExploitThird Party Advisory
- https://vuldb.com/submit/810076Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362562Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362562/ctiPermissions RequiredVDB Entry
- https://www.tenda.com.cn/Product
FAQ
What is CVE-2026-8265?
CVE-2026-8265 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A security vulnerability has been detected in Tenda AC6 15.03.06.23. Affected by this issue is the function get_log_file of the file /goform/getLogFile of the component httpd. The manipulation of the ...
How severe is CVE-2026-8265?
CVE-2026-8265 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8265?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac6 Firmware, Tenda Ac6.