Impact
A buffer overflow occurs in the UpdateWanParams function of the /goform/aspForm endpoint in H3C Magic B3 routers, enabling an attacker to send a maliciously crafted argument that overflows the buffer. This flaw can be triggered remotely, as stated in the description, and may allow an attacker to execute arbitrary code or hijack the device. The weakness is classified as a classic stack buffer overflow (CWE‑119) and related heap corruption (CWE‑120).
Affected Systems
H3C Magic B3 routers running firmware versions up to 100R002 are affected. No other product or version data is available.
Risk and Exploitability
The CVSS score of 8.6 marks this vulnerability as High severity, and the lack of an EPSS score does not diminish the real risk; the vulnerability has been publicly disclosed and may already be in use. The vulnerability is not listed in the CISA KEV, but its remote exploitability and high impact make it a priority for remediation. Attackers can exploit the flaw by sending specially crafted requests from the network to the device’s web interface, requiring no privileged local access.
OpenCVE Enrichment