Impact
Tenda i12 firmware version 1.0.0.6(2204) contains a stack‑based buffer overflow in the formwrlSSIDget function of the /goform/wifiSSIDget interface. The overflow is triggered by manipulating the argument index; this allows an attacker to corrupt the stack, potentially leading to arbitrary code execution or denial of service. The weakness is classified under CWE‑119 and CWE‑121, indicating a classic buffer overflow and stack-based exploitation scenario.
Affected Systems
The affected product is the Tenda i12 router, specifically firmware releases 1.0.0.6(2204). No other products or versions are listed as impacted according to the dataset.
Risk and Exploitability
The CVSS base score is 8.7, reflecting severe impact. EPSS indicates that the probability of exploitation is currently below 1%, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation in the wild. However, the attack vector is remote, as the flaw lives in a web‑accessible form, and the public exploit has been disclosed. Attackers can trigger the overflow by sending crafted requests to the vulnerable endpoint from an external network.
OpenCVE Enrichment