Impact
The vulnerability is a stack-based buffer overflow in the fromAdvSetMacMtuWan function located at /goform/AdvSetMacMtuWan in the firmware of Tenda AC21. This flaw allows an attacker to manipulate input to overflow a buffer on the stack, potentially leading to arbitrary code execution or denial of service. The problem is classified as a stack overflow (CWE-119) and buffer overrun (CWE-121).
Affected Systems
Tenda AC21 routers running firmware version 16.03.08.16 are affected. Devices with the AC21 model and the specified firmware build are the only ones listed as vulnerable. No other firmware versions or models are known to be affected at this time.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity vulnerability, and the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The flaw is not currently listed in the CISA KEV catalog. Remote exploitation requires reaching the /goform/AdvSetMacMtuWan endpoint and sending a specially crafted payload that overflows the stack. Once executed, the payload could allow an attacker to run arbitrary commands with the privileges of the web interface, potentially compromising the entire device.
OpenCVE Enrichment