Impact
A stack-based buffer overflow exists in the QuickIndex endpoint of Tenda F453, where manipulation of the arguments mit_linktype or PPPOEPassword causes memory corruption. The flaw is a classic buffer overflow (CWE-119) combined with stack-based overflow (CWE-121), providing attacker control over instruction flow and potentially full remote code execution. The exploit can compromise confidentiality, integrity, and availability of the device and any connected network resources.
Affected Systems
The vulnerability affects routers identified as Tenda F453, specifically firmware version 1.0.0.3. Users of this model should verify they are running this or earlier firmware to assess risk.
Risk and Exploitability
The CVSS base score of 8.7 denotes high severity, while the EPSS score of less than 1% indicates a low current exploitation probability. Nonetheless, the exploit code has been made public and can be launched remotely, meaning an adversary with network access to the router could trigger the overflow. The vulnerability is not listed in the CISA KEV catalog, but its impact remains significant due to the severity rating and remote launch capability.
OpenCVE Enrichment