Impact
A stack-based buffer overflow exists in the Httpd Service of Tenda A18, triggered by the strcpy operation on the wpapsk_crypto5g argument within the WifiExtraSet function. The flaw allows a remote attacker to corrupt the stack, which could lead to arbitrary code execution or denial of service. The weakness is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Buffer) and CWE-121 (Stack-based Buffer Overflow).
Affected Systems
The vulnerability affects the Tenda A18 router model running firmware version 15.13.07.13. The hardware and its associated firmware are impacted.
Risk and Exploitability
The CVSS base score of 8.7 reflects high severity, while the EPSS score of less than 1% signals a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread known exploitation. The attack vector is remote, accessed via the Httpd Service, requiring the ability to send crafted parameters to the /goform/WifiExtraSet endpoint. Based on the description, it is inferred that the attacker does not need administrative credentials to trigger the flaw.
OpenCVE Enrichment