This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical **Stack-based Buffer Overflow** in Tenda WH450. π₯ **Consequences**: Attackers can overwrite memory, leading to **Remote Code Execution (RCE)**.β¦
π‘οΈ **Root Cause**: **CWE-121** (Stack-based Buffer Overflow). π **Flaw**: Improper handling of the `page` parameter in the `/goform/NatStaticSetting` endpoint. Input exceeds buffer limits, corrupting the stack.
Q3Who is affected? (Versions/Components)
π¦ **Affected Product**: Tenda WH450 Wireless Access Point. π **Vulnerable Version**: **1.0.0.18**. β οΈ Other versions may be safe, but this specific build is confirmed vulnerable.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: **Root/System Level**. π **Data**: Full access to device data. π **Impact**: Since CVSS is **High (H)** for C/I/A, hackers can execute arbitrary code, steal data, or crash the device remotely.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: **LOW**. π« **Auth**: No authentication required (`PR:N`). π±οΈ **UI**: No user interaction needed (`UI:N`). π **Vector**: Network accessible (`AV:N`). Easy to exploit remotely.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π£ **Public Exploit**: **YES**. π **Source**: GitHub PoCs available (e.g., `z472421519/BinaryAudit`). π **Status**: Technical descriptions and reproduction steps are public. Wild exploitation is possible.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for Tenda WH450 devices running firmware **1.0.0.18**. π‘ **Detection**: Look for requests to `/goform/NatStaticSetting` with oversized `page` parameters.β¦
π§ **Workaround**: If no patch, **disable remote management** or block access to `/goform/NatStaticSetting` via firewall rules. π Isolate the device on a segmented network to prevent lateral movement.β¦
π₯ **Urgency**: **CRITICAL**. π **Priority**: **P1**. With **CVSS 9.1**, **No Auth**, and **Public PoC**, this is an immediate threat. Patch or isolate **NOW**. β³ Time is of the essence.