Impact
A stack-based buffer overflow exists in the formSetAutoPing function in the Tenda W3 firmware 1.0.0.3(2204). Manipulating the POST parameters ping1 or ping2 over the /goform/setAutoPing endpoint causes a buffer overflow on the stack, potentially allowing an attacker to execute arbitrary code or crash the device. The vulnerability is tied to classic buffer overrun weaknesses identified by CWE-119, CWE-121 and CWE-787.
Affected Systems
The affected device is the Tenda W3 router running firmware version 1.0.0.3(2204). No other vendors or products are listed.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests the current exploitation probability is low. The vulnerability can be triggered remotely by sending a crafted POST request to the management interface. The vendor has not catalogued this flaw as a known exploited vulnerability, but public exploit code has been disclosed and the flaw remains active.
OpenCVE Enrichment