Impact
A stack‑based buffer overflow exists in Tenda 4G06’s fromDhcpListClient function when the page argument is tampered with. The overflow occurs in the /goform/DhcpListClient endpoint and can be triggered remotely. If exploited, attackers could execute arbitrary code on the device, compromising confidentiality, integrity, and availability of the network.
Affected Systems
The flaw affects Tenda routers of model 4G06 running firmware version 04.06.01.29. Manufacturers identify the device as Tenda 4G06, and the affected firmware is referenced by CPE identifiers that match this model and version.
Risk and Exploitability
The vulnerability scores a CVSS of 8.7, indicating high severity, while the EPSS score is below 1%, suggesting low current exploit probability. It is not listed in CISA’s KEV catalog, and an exploit has already been published publicly. Attackers only need network access to the device’s DhcpListClient endpoint, and the vector is remote; no local privilege is required.
OpenCVE Enrichment