Impact
An input validation flaw in Tenda W20E’s addAuthUser function allows a buffer overflow when the supplied userInfo string is processed by sscanf without length checks. The overflow can corrupt adjacent memory, giving an attacker the potential to execute arbitrary code, elevate privileges, or crash the device. The weakness is identified as CWE‑120.
Affected Systems
Affected systems are the Tenda W20E router with firmware V4.0br_V15.11.0.6 and firmware 15.11.0.6; no other vendors are listed as impacted.
Risk and Exploitability
The vulnerability scores a CVSS of 9.8, indicating critical severity. The EPSS probability is less than 1 % and the flaw is not yet listed in the CISA KEV catalog. The likely attack vector is sending a crafted userInfo parameter to the router’s HTTP management interface, which causes the unchecked sscanf call to overflow the buffer. Security teams should treat this as a high‑risk threat and prioritize remediation accordingly.
OpenCVE Enrichment