Description
A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Published: 2026-03-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow occurs in the fromNatStaticSetting function on the Tenda FH1202 router. By manipulating the page argument to the /goform/NatSaticSetting endpoint, a remote attacker can overflow a buffer on the stack. This flaw may allow execution of arbitrary code, compromise device integrity, and potentially provide a foothold for further network attacks. The vulnerability directly threatens confidentiality and availability of the affected system.

Affected Systems

The vulnerability affects the Tenda FH1202 router running firmware version 1.2.0.14(408). This includes devices identified by the CPE strings cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:* and cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14(408):*:*:*:*:*.*

Risk and Exploitability

The CVSS score of 8.7 denotes a high severity, and the EPSS score of < 1% indicates a very low yet nonzero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, but its exploit has been published and may be used. The attack vector is inferred to be remote, as the flaw can be triggered over a network connection to the router's web interface.

Generated by OpenCVE AI on April 16, 2026 at 10:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Immediately update the device to the latest firmware version that includes the stack buffer overflow fix.
  • Restrict remote access to the router's web interface to trusted internal IPs or VPN connections only.
  • If a firmware update is unavailable, disable the NatSaticSetting page or the web management interface entirely to eliminate the attack surface.

Generated by OpenCVE AI on April 16, 2026 at 10:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh1202
CPEs cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*
Vendors & Products Tenda fh1202

Mon, 09 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Title Tenda FH1202 NatSaticSetting fromNatStaticSetting stack-based overflow
First Time appeared Tenda
Tenda fh1202 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh1202_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh1202 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh1202 Fh1202 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T15:32:15.234Z

Reserved: 2026-03-08T16:22:48.509Z

Link: CVE-2026-3809

cve-icon Vulnrichment

Updated: 2026-03-10T15:31:24.757Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T08:16:01.263

Modified: 2026-03-09T15:30:24.130

Link: CVE-2026-3809

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:30:16Z

Weaknesses