Impact
A stack-based buffer overflow exists in the WrlclientSet function of the Tenda FH1201 firmware 1.2.0.14(408). By manipulating the GO argument sent to the /goform/WrlclientSet endpoint, an attacker can overflow a stack buffer, potentially allowing arbitrary code execution or causing a crash. The vulnerability is exploitable remotely and public proofs of concept are available, indicating a realistic threat for devices exposed to unauthenticated network traffic.
Affected Systems
The flaw affects the Tenda FH1201 router running firmware 1.2.0.14(408). No other firmware releases were explicitly listed as vulnerable. The issue resides in the Parameter Handler component accessed via the device’s web interface.
Risk and Exploitability
The CVSS score of 8.7 places the vulnerability in the high severity range, while the EPSS score below 1% suggests low current exploitation prevalence, though the public nature of the exploit increases risk over time. The attack vector is inferred to be remote, likely from the internet or untrusted local networks, through the HTTP management interface. As the vulnerability is listed as not in the CISA KEV catalog, it has not yet been officially recognized as a widely exploited threat, but its potential for remote code execution warrants immediate attention.
OpenCVE Enrichment