Description
A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Published: 2026-03-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the formWebTypeLibrary function of Tenda FH1202, triggered by manipulating the webSiteId argument in the /goform/webtypelibrary endpoint. The flaw exploits common buffer handling weaknesses (CWE‑119) and stack corruption (CWE‑121), allowing an attacker to corrupt memory and potentially execute arbitrary code on the router. The vulnerability exposes the router to remote exploitation through the web interface, which can lead to full system compromise, loss of confidentiality, integrity, and availability.

Affected Systems

The affected equipment is the Tenda FH1202 router running firmware version 1.2.0.14(408). No other versions are listed in the advisory, but any device presenting the same firmware build is vulnerable.

Risk and Exploitability

CVSS scoring indicates a high severity of 8.7, while the EPSS score is below 1%, suggesting low current exploitation probability. The vulnerability is not present in CISA’s KEV catalog, but a public exploit is available. Attackers can reach the vulnerable endpoint remotely, typically by sending crafted POST requests to /goform/webtypelibrary with an oversized webSiteId parameter, triggering the stack overflow and enabling code execution, as inferred from the description.

Generated by OpenCVE AI on April 17, 2026 at 11:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest firmware that contains a fix for the buffer overflow.
  • If an update is unavailable, block or limit access to the /goform/webtypelibrary endpoint using the router’s built‑in firewall or access control lists.
  • Configure the web management interface to accept connections only from trusted internal IP addresses or secure the device with a VPN.

Generated by OpenCVE AI on April 17, 2026 at 11:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh1202
CPEs cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*
Vendors & Products Tenda fh1202

Mon, 09 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Title Tenda FH1202 webtypelibrary formWebTypeLibrary stack-based overflow
First Time appeared Tenda
Tenda fh1202 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh1202_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh1202 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh1202 Fh1202 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T15:38:14.956Z

Reserved: 2026-03-08T16:22:45.108Z

Link: CVE-2026-3808

cve-icon Vulnrichment

Updated: 2026-03-10T15:35:20.180Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T08:16:01.030

Modified: 2026-03-09T15:30:33.183

Link: CVE-2026-3808

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:00:11Z

Weaknesses