Impact
The vulnerability arises from an uncontrolled write to a stack buffer in the formexeCommand function of the Tenda i3 firmware. A malicious attacker can supply an oversized cmdinput value that corrupts the return pointer, enabling arbitrary code execution. The exploitation is a classic stack-based buffer overflow whose primary effect is the ability to execute arbitrary instructions on the device, thereby compromising confidentiality, integrity, and availability of the device and potentially the network it supports.
Affected Systems
The affected product is the Tenda i3 router running firmware version 1.0.0.6(2204). The flaw resides in the network access endpoint /goform/exeCommand, which is exposed to remote users. No other products or firmware versions were identified as vulnerable in the available data.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity attack. The EPSS of <1% suggests that automated exploitation may be rare, but the public disclosure and remote execution capability raise the risk of targeted attacks. The vulnerability is not listed in the CISA KEV catalog, yet any remote access to the /goform/exeCommand endpoint could potentially be leveraged to hijack the device. The attack vector is remote, as the description states that execution may be performed from outside the local network, implying that no local user privileges are required.
OpenCVE Enrichment