Impact
A buffer overflow flaw exists in the Tenda TX3 router’s /goform/SetIpMacBind endpoint. The flaw is triggered by malicious manipulation of the function’s argument list, which allows an attacker to corrupt memory. This memory corruption can potentially lead to arbitrary code execution, compromising the confidentiality, integrity, and availability of the device and any networks it manages. The weakness is a classic stack-based buffer overflow (CWE-119 and CWE-120).
Affected Systems
Tenda TX3 routers running firmware versions up to 16.03.13.11_multi are affected. The issue lies in the web management interface and can impact any unit still on those firmware releases.
Risk and Exploitability
The CVSS score is 8.7, indicating high severity. EPSS is reported as less than 1 %, showing a low global exploitation probability at this time, and the vulnerability is not currently listed in the CISA KEV catalog. Nevertheless, the attack can be launched remotely via the HTTP interface, likely by sending crafted requests to the SetIpMacBind endpoint. Because the flaw is not limited by network boundaries it can be abused from external networks provided remote management is enabled.
OpenCVE Enrichment