Impact
A stack-based buffer overflow occurs in the Tenda HG3 2.0 firmware when the destNet argument is supplied to the formUploadConfig function in /boaform/formIPv6Routing. The flaw can lead to memory corruption that potentially allows an attacker to execute arbitrary code locally on the device or crash it, resulting in denial of service. The vulnerability is exploited remotely through crafted HTTP requests and has already been publicly disclosed. The risk is high, as the overflow is triggered by user-controlled input and the affected functionality is exposed over the network.
Affected Systems
The vulnerability affects the Tenda HG3 router running firmware version 2.0. Devices manufactured by Tenda under the HG3 model are impacted; no other vendors or product lines are listed as affected.
Risk and Exploitability
The CVSS score for this issue is 8.7, indicating high severity. The EPSS score is not available, so precise exploitation frequency cannot be quantified, but the lack of a KEV listing does not diminish the potential for widespread attacks. The attack vector is remote over HTTP, requiring only network access to the router's management interface. Once the buffer overflow is triggered, an attacker could gain elevated privileges on the device, compromising the confidentiality, integrity, and availability of the network.
OpenCVE Enrichment