Description
A vulnerability has been found in H3C Magic B1 up to 100R004. The affected element is the function SetAPWifiorLedInfoById of the file /goform/aspForm. The manipulation of the argument param leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-19
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: Remote Buffer Overflow leading to potential code execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the SetAPWifiorLedInfoById function of the H3C Magic B1 web interface, allowing an attacker to send crafted input that may overflow a buffer and execute arbitrary code. The vulnerability is rated with a CVSS score of 8.7, indicating high severity and a significant potential impact on confidentiality, integrity, and availability.

Affected Systems

H3C Magic B1 routers running firmware versions up to 100R004 are affected. The flaw resides in the /goform/aspForm endpoint of the device’s web management interface.

Risk and Exploitability

The flaw can be triggered remotely by sending malicious requests to the vulnerable endpoint. EPSS data is not available and the issue is not listed in CISA’s KEV catalog, but the public disclosure and the vulnerability’s high CVSS score suggest that it is likely to be exploited by adversaries with sufficient interest. Because the vendor has not issued a public fix, the attack surface remains open until a patch is applied or mitigations are enforced.

Generated by OpenCVE AI on April 19, 2026 at 09:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device firmware to the latest version where the buffer overflow is fixed, if such a release is available from H3C.
  • If a patch is not yet released, block or restrict access to the /goform/aspForm endpoint by configuring firewall rules or access control lists to limit management traffic to trusted hosts only.
  • Monitor the router’s management interface for anomalous or large payloads targeting /goform/aspForm and alert on suspicious activity.
  • Consider network segmentation to isolate the router from untrusted networks and reduce the exposure of the vulnerable interface.

Generated by OpenCVE AI on April 19, 2026 at 09:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 19 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared H3c
H3c magic B1
Vendors & Products H3c
H3c magic B1

Sun, 19 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in H3C Magic B1 up to 100R004. The affected element is the function SetAPWifiorLedInfoById of the file /goform/aspForm. The manipulation of the argument param leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title H3C Magic B1 aspForm SetAPWifiorLedInfoById buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-19T08:30:14.248Z

Reserved: 2026-04-18T16:02:07.227Z

Link: CVE-2026-6563

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-19T09:16:11.000

Modified: 2026-04-19T09:16:11.000

Link: CVE-2026-6563

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-19T09:30:23Z

Weaknesses