Critical Vulnerability Information Product Information Vendor: Tenda Affected Product: AC6 Affected Firmware Versions: <= V15.03.05.19 Vulnerability Overview Type: Buffer Overflow Vulnerability Location: function Trigger Method: Sending an HTTP request with a malicious parameter, causing stack overflow and segmentation fault. Vulnerability Details Problematic Code: Description: The function is used to copy the parameter into buffer without boundary checking. If the parameter exceeds 0x120 bytes in length, it will cause a buffer overflow, potentially leading to denial of service (DoS) or arbitrary code execution. POC (Proof of Concept) Python Code Example: Impact May result in denial of service (DoS) or remote code execution.