Impact
A stack-based buffer overflow occurs in the fromqossetting function of the /goform/qossetting endpoint on Tenda F451 routers. By manipulating the qos parameter, an attacker can trigger the vulnerability remotely and potentially execute arbitrary code, compromising confidentiality, integrity, and availability of the device and the network it manages. The flaw falls under CWE-119 and CWE-121, indicating classic buffer overflow weaknesses.
Affected Systems
The vulnerability affects the Tenda F451 router running firmware version 1.0.0.7_cn_svn7958. Users running this firmware should identify whether their devices are on the affected version and note that no other versions are listed as impacted in the available data.
Risk and Exploitability
The CVSS score of 8.7 reflects high severity. The EPSS score is not publicly available, yet a public exploit has been released, and the attack vector is remote, implying unauthenticated exploitation is possible via crafted HTTP requests. The vulnerability is not listed in CISA's KEV catalog, but the existence of an available exploit suggests a realistic risk of actual attacks.
OpenCVE Enrichment