Impact
A stack‑based buffer overflow exists in the fromDhcpListClient function of the httpd component on Tenda F451 routers running firmware 1.0.0.7. By sending a specially crafted page parameter to the /goform/DhcpListClient endpoint, an attacker can corrupt the stack and may be able to execute arbitrary code on the device. The flaw is identified by CWE‑119 and CWE‑121.
Affected Systems
The vulnerability targets Tenda F451 routers with firmware version 1.0.0.7. The affected component is the HTTP server’s DhcpListClient handler exposed through the web management interface.
Risk and Exploitability
The CVSS base score of 8.7 classifies the issue as high severity. The EPSS score is unavailable and the vulnerability is not listed in CISA’s KEV catalog, yet a public exploit has been disclosed. The attack can be launched remotely via the web interface, which could potentially lead to code execution on the device and compromise the device or its network.
OpenCVE Enrichment