Title Tenda W6-S V1.0.0.4(510) OS Command Injection Description Tenda's ate service ( ) which runs on port 7329 is vulnerable to pre-authentication command injection using a crafted UDP packet. The ATE service can be enabled by a remote attacker on demand via endpoint in . Command injection can be achieved by sending a crafted UDP packet to port 7329 after enabling ATE service. Commands starting with are executed without input sanitization. Source  User dwbruijn (UID 93926) Submission 12/28/2025 06:01 PM (6 days ago) Moderation 12/29/2025 10:20 AM (16 hours later) Status Accepted VulDB entry 338644 [Tenda W6-S 1.0.0.4(510) ATE Service /goform/ate TendaAte os command injection] Points 20