Impact
The vulnerability is a stack‑based buffer overflow in the formwrlSSIDget function exposed at /goform/wifiSSIDget on Tenda i3 firmware 1.0.0.6(2204). Manipulating the argument index can corrupt the stack and may allow an attacker to execute arbitrary code. The flaw falls under CWE‑119, CWE‑121, and CWE‑787 and can lead to compromise of confidentiality, integrity, and availability of the device and any network it connects to.
Affected Systems
Affected devices are Tenda i3 routers running firmware version 1.0.0.6(2204). The attack vector is through a remote web interface that accepts an index parameter, so the compromise can occur over the network without local access.
Risk and Exploitability
The CVSS score of 8.7 classifies the flaw as high severity. EPSS indicates a very low current exploit probability (<1%), yet the exploit has already been published. The vulnerability is not listed in CISA KEV, but the presence of a public exploit and remote trigger elevate the risk. An attacker with network access to the device could trigger the overflow, potentially leading to remote code execution.
OpenCVE Enrichment