No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac6
|
|
| Vendors & Products |
Tenda ac6
|
Mon, 11 May 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Tenda AC6 15.03.06.23. Affected by this issue is the function get_log_file of the file /goform/getLogFile of the component httpd. The manipulation of the argument wans.flag leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. | |
| Title | Tenda AC6 httpd getLogFile get_log_file os command injection | |
| First Time appeared |
Tenda
Tenda ac6 Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:tenda:ac6_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda ac6 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T02:30:14.220Z
Reserved: 2026-05-10T15:35:42.308Z
Link: CVE-2026-8265
No data.
Status : Received
Published: 2026-05-11T04:16:19.860
Modified: 2026-05-11T04:16:19.860
Link: CVE-2026-8265
No data.
OpenCVE Enrichment
Updated: 2026-05-11T04:30:27Z