Impact
The vulnerability is a stack‐based buffer overflow that occurs in the formWifiMacFilterSet endpoint of the Tenda W3 router firmware (1.0.0.3(2204)). A malicious user can construct a POST request with an out‑of‑bounds value for the argument index/GO, causing a buffer overflow. This enables the attacker to overwrite the stack, potentially injecting arbitrary code and gaining full control of the device. The weakness is classified as CWE‑119 and CWE‑121.
Affected Systems
Affected systems are Tenda W3 routers running firmware version 1.0.0.3(2204). No other versions are listed as vulnerable, so only devices with this exact firmware revision are at risk.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, and the EPSS score of less than 1% suggests low likelihood of widespread exploitation, but the flaw can be triggered remotely without authentication. The vulnerability is not catalogued by CISA KEV, but public exploit code is available. Administrators of Tenda W3 routers should assess whether the device is exposed to the internet and apply the appropriate fix or mitigation.
OpenCVE Enrichment