Impact
A stack-based buffer overflow occurs in the fromSafeClientFilter function of the Parameters Handler on Tenda F453 routers. By manipulating the 'menufacturer/Go' argument sent to the /goform/SafeClientFilter endpoint, an attacker can overwrite adjacent stack memory. This defect could allow an attacker to crash the service or potentially execute arbitrary code, jeopardizing the router’s integrity and availability.
Affected Systems
The vulnerability affects Tenda F453 routers running firmware version 1.0.0.3. No other versions are listed as compromised in the supplied data. Thus only devices with this specific firmware are at risk.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity attack. The EPSS score of less than 1% suggests low overall exploitation probability, yet the flaw is publicly known and exploitable remotely, as the attack vector originates from a crafted HTTP request to a publicly exposed endpoint. The vulnerability is not listed in the CISA KEV catalog, but the remote nature of the attack and the presence of a public exploit reduce confidence in the defense posture. Administrators should treat it as a high-risk vulnerability requiring immediate attention.
OpenCVE Enrichment