Description
A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-03-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Apply Workaround
AI Analysis

Impact

This vulnerability presents a stack-based buffer overflow in the formWrlsafeset function within the /goform/AdvSetWrlsafeset interface of Tenda FH1202 routers running firmware 1.2.0.14(408). By supplying crafted values for the mit_ssid/mit_ssid_index parameters, an attacker can overflow the local stack buffer. The CVE description does not specify the exact consequences, but a stack overflow can potentially allow the attacker to execute arbitrary code or cause a denial of service.

Affected Systems

Affected devices are Tenda FH1202 routers with firmware version 1.2.0.14(408). No other vendors, products, or firmware revisions are listed as impacted in the CNA or CPE entries.

Risk and Exploitability

The CVSS score of 8.7 marks the flaw as high severity; however, the EPSS score of less than 1% suggests a low current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog, indicating no widespread exploitation yet. Attackers would need remote network access to the router’s web interface, specifically the /goform/AdvSetWrlsafeset endpoint, to craft the malicious mit_ssid input. The attack vector is described as remote, but the exact method of code execution remains unspecified.

Generated by OpenCVE AI on April 18, 2026 at 17:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Tenda’s support portal for a firmware update that resolves the buffer overflow and apply it when available.
  • Use firewall or ACL to block external access to the /goform/AdvSetWrlsafeset endpoint, limiting exposure of the vulnerable interface.
  • If the router allows it, disable the AdvSetWrlsafeset functionality or restrict the web interface to local access only.
  • Monitor threat intelligence sources for emerging exploit activity related to CVE‑2026‑3807.

Generated by OpenCVE AI on April 18, 2026 at 17:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh1202
CPEs cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*
Vendors & Products Tenda fh1202

Mon, 09 Mar 2026 06:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
Title Tenda FH1202 AdvSetWrlsafeset formWrlsafeset stack-based overflow
First Time appeared Tenda
Tenda fh1202 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh1202_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh1202 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh1202 Fh1202 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T15:44:51.033Z

Reserved: 2026-03-08T16:22:36.756Z

Link: CVE-2026-3807

cve-icon Vulnrichment

Updated: 2026-03-10T15:44:46.767Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T07:16:04.147

Modified: 2026-03-09T16:20:08.637

Link: CVE-2026-3807

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:30:05Z

Weaknesses