Impact
A stack‑based buffer overflow exists in the SetIpMacBind function of the Tenda A18 Pro firmware. By sending a crafted argument list to the /goform/SetIpMacBind web form, an attacker can overflow the input buffer, corrupt the stack, and potentially execute arbitrary code with the device’s privileges. The vulnerability is rooted in CWE‑119 (Buffer Overflow) and CWE‑121 (Stack‑Based Buffer Overflow).
Affected Systems
The affected product is the Tenda A18 Pro running firmware version 02.03.02.28. No other vendors, products, or versions are listed as impacted.
Risk and Exploitability
The vulnerability scores a high 8.7 on the CVSS scale and is exploitable remotely through the web interface. A public exploit has been disclosed, and the absence of a known patch increases the likelihood of exploitation when the device is exposed to a network. The risk is elevated for networks that allow inbound traffic to the device’s management interface.
OpenCVE Enrichment