Impact
A buffer overflow occurs in the fromP2pListFilter function within the httpd component, triggered by the page parameter of the /goform/P2pListFilterof interface. The flaw allows an attacker to overwrite stack or heap memory, which can result in arbitrary code execution, denial of service, and full compromise of the affected Tenda F453 router. The weakness aligns with improper boundary checks and buffer overrun vulnerabilities (CWE-119 and CWE-120).
Affected Systems
The vulnerability applies to the Tenda F453 router running firmware version 1.0.0.3. No other Tenda models or firmware versions are indicated as affected.
Risk and Exploitability
The scored CVSS is 8.7, indicating high severity. The EPSS is below 1%, suggesting low current exploitation probability, but the exploit exists publicly and can be launched remotely via crafted HTTP requests. The vulnerability is not listed in the CISA KEV catalog, so there is no mandatory government mitigation. An attacker with network access to the router’s management interface can send malicious requests and potentially take full control of the device.
OpenCVE Enrichment