Impact
A stack-based buffer overflow exists in the /goform/fast_setting_wifi_set function of Tenda RX3 firmware. By manipulating the ssid_5g parameter, an attacker can trigger the overflow remotely, potentially executing arbitrary code on the device. The vulnerability is publicly documented and an exploit is available, giving attackers a straightforward path to compromise the router’s control plane.
Affected Systems
The flaw affects the Tenda RX3 router, specifically firmware version 16.03.13.11. No other Tenda products or firmware revisions are mentioned as impacted in the available data.
Risk and Exploitability
The issue receives a high CVSS score of 8.7. The EPSS score is reported as less than 1%, indicating a low exploitation probability in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, relying on access to the router’s web interface; no local privileges are required. Attackers who succeed can gain full control of the device via the exposed endpoint.
OpenCVE Enrichment