Impact
The vulnerability resides in the fromSafeClientFilter function within the httpd component of the Tenda F451 firmware. Providing the string "menufacturer/Go" as an argument to the /goform/SafeClientFilter endpoint a buffer overflow, which can be leveraged by an attacker to execute arbitrary code on the device. The description states that remote exploitation is possible and that a public exploit exists, indicating that an attacker can gain control without local access.
Affected Systems
The only vendor/product explicitly listed in the CNA data is Tenda F451. The affected firmware is identified as 1.0.0.7_cn_svn7958. No additional version ranges are provided, so any device running that exact build or earlier unpatched builds is at risk.
Risk and Exploitability
The CVSS base score of 8.7 categorizes this flaw as a high severity vulnerability. EPSS information is not available, so the current evidence does not quantify exploitation frequency, but the statement that a public exploit is available suggests that the risk of real-world attacks is substantial. Because the flaw allows remote code execution and is publicly documented, a likely attack vector is a network-facing HTTP request to the affected endpoint. The device is not listed in the CISA KEV catalog, which may delay awareness, but the severity and public exploit availability underscore the need for rapid remediation.
OpenCVE Enrichment