Impact
The vulnerability lies in the fromwebExcptypemanFilter function of the Tenda F451 httpd component. A malformed page argument triggers a buffer overflow, which may enable an attacker to execute arbitrary code on the device with privileges of the httpd process, compromising confidentiality, integrity, and availability of traffic handled by the device.
Affected Systems
Tenda F451 model with firmware version 1.0.0.7_cn_svn7958. The affected component is the httpd service accessed via /goform/webExcptypemanFilter.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. No EPSS data is available and the vulnerability is not listed in the CISA KEV catalog. The attack can be launched remotely by sending a crafted request to the web form endpoint, as the exploit has been publicly disclosed. Given the lack of mitigation on typical consumer routers, the risk to exposed devices is significant.
OpenCVE Enrichment