Impact
The vulnerability resides in the addDhcpRules handler of Tenda W20E V4.0br_V15.11.0.6 firmware. An attacker can transmit data that exceeds the expected length, and because the sscanf call does not enforce bounds on dhcpsIndex, dhcpsIP and dhcpsMac, a buffer overflow occurs. This memory corruption can allow arbitrary code execution or a denial‑of‑service condition, consistent with CWE‑120.
Affected Systems
The flaw affects Tenda W20E routers running firmware version 4.0br_V15.11.0.6 (firmware build 15.11.0.6). Any device that exposes the addDhcpRules interface and is reachable from the network is subject to this issue.
Risk and Exploitability
With a CVSS score of 9.8 the vulnerability is rated critical. The EPSS score is below 1 %, indicating that, as of the data set, exploitation is unlikely. It is not currently listed in the CISA KEV catalog, so there are no documented exploits. The likely attack vector is remote, originating from the network interface that accepts DHCP rule submissions, potentially without authentication.
OpenCVE Enrichment