Impact
The vulnerability is a stack-based buffer overflow triggered by an out-of-bounds write to the wl_radio argument in the Tenda W3 firmware's /goform/WifiMacFilterGet POST handler. The flaw is described as enabling attackers to overflow a local stack buffer, which can lead to arbitrary code execution on the router. The vulnerability maps to CWE-119 and CWE-121, indicating unsafe buffer usage and stack manipulation weaknesses.
Affected Systems
Affected are Tenda W3 routers running firmware version 1.0.0.3(2204). The known impacted product is explicitly the Tenda W3 platform; no other models or firmware revisions are listed.
Risk and Exploitability
The CVSS score of 8.7 reveals a high severity level. An EPSS score of less than 1% suggests a low overall probability of exploitation, though an exploit has been publicly released in the wild and can be launched remotely. The vulnerability is not listed in the CISA KEV catalog, indicating no known large-scale exploit reports, but the public exploit code and remote attack potential necessitate immediate attention.
OpenCVE Enrichment