Impact
The Tenda W3 router version 1.0.0.3(2204) contains a stack‑based buffer overflow in the formexeCommand function of the /goform/exeCommand HTTP handler. Manipulating the cmdinput argument can overflow the stack, potentially allowing an attacker to execute arbitrary code on the device. The vulnerability is identified as CWE‑119 and CWE‑121, both describing buffer overflows. The impact is that a remote attacker could compromise the router’s integrity and confidentiality, leading to full control of the device.
Affected Systems
Vendor: Tenda, Product: W3 router. Affected version: 1.0.0.3(2204). No other versions are listed as affected.
Risk and Exploitability
The CVSS v3 score is 8.7, indicating a high severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the near term, but the vulnerability is publicly available and may be actively used. The exploit can be performed remotely, and the CVE is not listed in CISA’s KEV catalog. The known public exploits on GitHub and VULDB demonstrate that the attack vector is feasible without special conditions.
OpenCVE Enrichment