Impact
The flaw is a stack‑based buffer overflow triggered by manipulating the guest Wi‑Fi configuration parameters – guestWrlPwd, guestEn, guestSsid, hideSsid, and guestSecurity – in the fromGetWifiGuestBasic function of /goform/WifiGuestSet. Remote parties can supply overtly large or malformed values which overflow the stack, potentially allowing arbitrary code execution on the router’s firmware. Based on the description, it is inferred that an attacker who can reach the router’s web interface could exploit this flaw to execute code or cause a crash.
Affected Systems
Tenda AX1803 routers running firmware version 1.0.0.1 are affected. No other firmware versions were identified in the CNA data.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. The EPSS score of <1% shows a low historical exploitation probability, but the presence of a published exploit indicates that real‑world attacks are possible. The vulnerability can be exploited remotely by sending crafted requests to the device’s Web interface, as indicated by the CVE description. It is not listed in the CISA KEV catalog. The flaw belongs to CWE‑119 and CWE‑121, classic stack‑based overflow weaknesses.
OpenCVE Enrichment