Impact
The vulnerability is a stack-based buffer overflow in the formSetAutoPing function of the Tenda W3 1.0.0.3(2204) firmware. Manipulating the POST parameters ping1 or ping2 causes a stack overflow that can potentially allow an attacker to inject and execute arbitrary code or crash the router. The weakness is identified as CWE-119 and CWE-121.
Affected Systems
Affected vendor is Tenda, product W3. The vulnerable firmware version is 1.0.0.3(2204). No other versions are listed.
Risk and Exploitability
The CVSS score is 8.7, indicating a high impact potential. The EPSS score is below 1%, suggesting the exploit is not widely observed yet. The vulnerability is not listed in CISA's KEV catalog. The attack can be carried out remotely via the web interface by sending crafted POST requests to /goform/setAutoPing. Public exploits are available on GitHub and Vuldb, confirming that remote exploitation is possible.
OpenCVE Enrichment