Impact
A stack-based buffer overflow exists in the fromDhcpListClient function of the /goform/DhcpListClient page on Tenda FH1202 routers. The flaw is triggered by sending a specially crafted value for the page argument, which overflows a local stack buffer and can corrupt control data. Because the overflow can overwrite return addresses, the vulnerability can lead to arbitrary code execution on the device. The attack compromises confidentiality, integrity, and availability, as a successful exploit would give an attacker full control of the router.
Affected Systems
The affected device is the Tenda FH1202 router running firmware version 1.2.0.14(408). No other firmware versions are listed as vulnerable; newer releases may contain the fix or mitigation.
Risk and Exploitability
The CVSS base score is 8.7, indicating high severity. The EPSS score is below 1 %, suggesting a low current exploitation probability, although the flaw is publicly disclosed. The vulnerability is not included in CISA’s KEV catalog. The /goform/DhcpListClient endpoint is reachable over the local network, and the attack is considered network-based. This inference comes from the fact that the exploit is delivered via HTTP requests to that endpoint, implying that the attacker needs network access to the router. Consequently, devices exposed to the internet or untrusted networks remain at significant risk.
OpenCVE Enrichment