W6 S Firmware Tenda W6 S Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Tenda W6 S Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in Tenda W6 S Firmware. Last year, in 2025 W6 S Firmware had 4 security vulnerabilities published. Right now, W6 S Firmware is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 4 8.05
2024 0 0.00
2023 0 0.00
2022 6 7.88

It may take a day or so for new W6 S Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Tenda W6 S Firmware Security Vulnerabilities

A vulnerability was determined in Tenda W6-S 1.0.0.4(510)
CVE-2025-15255 9.8 - Critical - December 30, 2025

A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing a manipulation of the argument Cookie can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

Stack Overflow

A vulnerability was found in Tenda W6-S 1.0.0.4(510)
CVE-2025-15254 6.3 - Medium - December 30, 2025

A vulnerability was found in Tenda W6-S 1.0.0.4(510). This affects the function TendaAte of the file /goform/ate of the component ATE Service. Performing a manipulation results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.

Shell injection

Tenda W6_S v1.0.0.4_510 Remote Buffer Overflow via POST funcpara1
CVE-2025-28220 - March 28, 2025

Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the setcfm function, which allows remote attackers to cause web server crash via parameter funcpara1 passed to the binary through a POST request.

Buf Overflow in Tenda W6_S 1.0.0.4_510 via set_local_time
CVE-2025-28221 - March 28, 2025

Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the set_local_time function, which allows remote attackers to cause web server crash via parameter time passed to the binary through a POST request.

Tenda W6-S v1.0.0.4 Unauth Reboot via tpi_systool_handle
CVE-2022-45504 7.5 - High - December 08, 2022

An issue in the component tpi_systool_handle(0) (/goform/SysToolRestoreSet) of Tenda W6-S v1.0.0.4(510) allows unauthenticated attackers to arbitrarily reboot the device.

CVE-2022-45503: Tenda W6-S v1.0.0.4 Stack Overflow via linkEn in setAutoPing
CVE-2022-45503 7.5 - High - December 08, 2022

Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the linkEn parameter at /goform/setAutoPing.

Memory Corruption

Tenda W6S v1.0.0.4 Stack Overflow via wl_radio at /goform/wifiSSIDset
CVE-2022-45501 7.5 - High - December 08, 2022

Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the wl_radio parameter at /goform/wifiSSIDset.

Memory Corruption

Stack overflow in Tenda W6S v1.0.0.4 via wl_radio param
CVE-2022-45499 7.5 - High - December 08, 2022

Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the wl_radio parameter at /goform/WifiMacFilterGet.

Memory Corruption

Tenda W6S v1.0.0.4 Unauth Remote Reboot via /goform/SysToolReboot
CVE-2022-45498 7.5 - High - December 08, 2022

An issue in the component tpi_systool_handle(0) (/goform/SysToolReboot) of Tenda W6-S v1.0.0.4(510) allows unauthenticated attackers to arbitrarily reboot the device.

Tenda W6-S cmd injection tpi_get_ping_output (v1.0.0.4)
CVE-2022-45497 9.8 - Critical - December 08, 2022

Tenda W6-S v1.0.0.4(510) was discovered to contain a command injection vulnerability in the tpi_get_ping_output function at /goform/exeCommand.

Shell injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Tenda W6 S Firmware or by Tenda? Click the Watch button to subscribe.

Tenda
Vendor

subscribe