Description
A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Published: 2026-03-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow caused by improper validation of the index argument in the formWifiMacFilterGet function, which is exposed through the /goform/WifiMacFilterGet endpoint on Tenda i3 routers. The flaw allows an attacker to overflow the stack and execute arbitrary code, potentially compromising the device and any networks it connects to. It specifically involves the identified CWEs, 119 and 121, indicating unsafe buffer handling and stack exploitation.

Affected Systems

This issue affects Tenda i3 routers running firmware 1.0.0.6(2204). The device model is the Tenda i3, and the vulnerability resides in the router’s web interface that handles WiFi MAC filter configuration.

Risk and Exploitability

With a CVSS score of 8.7, the vulnerability is classified as high severity. The EPSS score is below 1%, indicating a low probability of exploitation in the general population, although a publicly available exploit exists, which could increase actual risk in targeted attacks. The vulnerability is not yet listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote via HTTP requests to the vulnerable endpoint, allowing an attacker to inject a crafted index parameter that overflows the stack and yields code execution.

Generated by OpenCVE AI on April 16, 2026 at 10:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest available version that addresses the stack overflow in formWifiMacFilterGet.
  • Restrict or disable remote access to the /goform/WifiMacFilterGet endpoint and any other management interfaces exposed over the network.
  • Validate or limit the index parameter on the router’s web form, or apply firewall rules to block unexpected traffic to the affected endpoint.

Generated by OpenCVE AI on April 16, 2026 at 10:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda i3
Tenda i3 Firmware
CPEs cpe:2.3:h:tenda:i3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i3_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i3
Tenda i3 Firmware

Mon, 09 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Title Tenda i3 WifiMacFilterGet formWifiMacFilterGet stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T17:25:58.880Z

Reserved: 2026-03-08T12:39:43.402Z

Link: CVE-2026-3803

cve-icon Vulnrichment

Updated: 2026-03-10T17:19:49.562Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T06:16:08.723

Modified: 2026-03-09T15:09:33.580

Link: CVE-2026-3803

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:30:16Z

Weaknesses