Impact
A stack-based buffer overflow exists in the formwrlSSIDset function of the /goform/wifiSSIDset handler on the Tenda i3 device. An attacker can manipulate the index/GO parameter to overflow a stack buffer, potentially allowing the execution of arbitrary code on the device. This weakness is a classic instance of out-of-bounds write leading to code execution.
Affected Systems
The vulnerability is known to affect the Tenda i3 router running firmware version 1.0.0.6(2204). The affected vendor is Tenda and the product model is i3. No other models or firmware revisions are specified as impacted.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. The EPSS score is below 1%, suggesting low current exploit prevalence, and the vulnerability is not listed in the CISA KEV catalog. Remote exploitation is possible through the router’s web interface, and thus an attacker with network access to the router’s management interface can trigger the overflow. The attack vector is inferred to be a remote web request exploiting the formwrlSSIDset function.
OpenCVE Enrichment