Impact
The vulnerability resides in the fromSafeMacFilter function of the /goform/SafeMacFilter endpoint in Tenda F453 firmware 1.0.0.3. An attacker can send crafted input via the page argument, causing a buffer overflow that may compromise local system memory. This can lead to arbitrary code execution or denial of service. The weakness maps to CWE-119 and CWE-120.
Affected Systems
Devices running Tenda F453 firmware 1.0.0.3 are affected. The product is a consumer router manufactured by Tenda. No other firmware versions were specified as vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation for the moment. The vulnerability is not listed in the CISA KEV catalog, but public exploits have been disclosed and can be triggered remotely, likely via HTTP requests to /goform/SafeMacFilter. The attack does not require authentication and targets the wireless MAC filtering functionality.
OpenCVE Enrichment