Impact
A stack-based buffer overflow exists in the fromwebExcptypemanFilter function of the /goform/webExcptypemanFilter endpoint on the Tenda CX12L router. When a manipulated page parameter is supplied locally, the overflow corrupts the stack, permitting an attacker to execute arbitrary code with the privileges of the router’s firmware. This can compromise confidentiality, integrity, and availability of the device and any devices on the local network.
Affected Systems
The vulnerability was identified in the Tenda CX12L router running firmware version 16.03.53.12. No other product versions or vendors were listed as affected.
Risk and Exploitability
The CVSS score of 8.6 indicates a high severity. While an EPSS score is not available, the flaw has been publicly disclosed and can be exploited by anyone with local network access. The vulnerability is not listed in the CISA KEV catalog, but the requirement for local access limits the attack surface to administrators or compromised devices on the network. The potential impact of arbitrary code execution makes prompt remediation essential.
OpenCVE Enrichment