Impact
Tenda HG9 routers running firmware 300001138 contain a stack-based buffer overflow in the web interface endpoint /boaform/formPing6 when the pingAddr parameter is manipulated. The overflow can corrupt the stack and lead to arbitrary code execution on the device. The weakness is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Buffer) and CWE-121 (Stack-based Buffer Overflow).
Affected Systems
The flaw affects Tenda HG9 devices, specifically firmware version 300001138. The vulnerability exists in the unknown code path handling the formPing6 request, which is part of the router’s web management interface.
Risk and Exploitability
The CVSS score of 8.7 marks the issue as High severity. The EPSS score of under 1% indicates low but non-zero likelihood of exploitation in the wild, and the flaw has not been included in the CISA KEV catalog. Attackers can reach the vulnerable endpoint remotely via the router’s web interface, likely over HTTP/HTTPS, and by sending a crafted pingAddr value gain remote code execution. No specific conditions or user privileges are required beyond external network access to the router’s management interface.
OpenCVE Enrichment