Impact
An attacker can remotely manipulate the GO parameter within the WrlclientSet function of the /goform/WrlclientSet endpoint. This triggers a stack-based buffer overflow that could allow arbitrary code execution or denial of service on the Tenda FH451 device. The vulnerability is classified as CWE‑119 and CWE‑121, indicating unsafe buffer operations that lead to stack corruption.
Affected Systems
Affected devices are Tenda FH451 routers running firmware 1.0.0.9. No other versions are explicitly mentioned.
Risk and Exploitability
The CVSS v3.1 score is 8.7, indicating a high severity level. The EPSS score is below 1 %, suggesting a relatively low probability of exploitation, yet a publicly disclosed exploit exists and could be used by attackers. The attack vector is remote and likely originates from a connected network or over the wireless interface. No known listing in the CISA KEV catalog.
OpenCVE Enrichment