Impact
An attacker can exploit a buffer overflow in the Edit_BasicSSID_5G function of the H3C Magic B1 web interface. The vulnerability is triggered by manipulating the param argument sent to /goform/aspForm, allowing an attacker to overflow the buffer and gain arbitrary code execution on the device. Because the flaw occurs in firmware up to 100R004, it can affect any deployed unit running that or earlier firmware, potentially compromising device confidentiality, integrity, and availability.
Affected Systems
Products affected are H3C Magic B1 routers running firmware versions 100R004 or earlier. The specific model is the Magic B1 series, as identified by the CPE strings. End‑users who have not applied the latest firmware upgrade are vulnerable.
Risk and Exploitability
With a CVSS score of 8.7 the vulnerability is high severity, while the EPSS score of <1% indicates low current exploitation probability. It is not listed in CISA’s KEV catalog, but public exploit code exists. The likely attack vector is remote, via HTTP POST to the web interface, and requires network connectivity to the device’s management port, as inferred from a description that the exploit can be executed remotely. No official patch is currently released, so the flaw remains exploitable until a firmware update is applied.
OpenCVE Enrichment