Description
A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.
Published: 2026-03-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Tenda FH1202 routers running firmware 1.2.0.14(408) contain a stack‑based buffer overflow in the fromP2pListFilter function of the /goform/P2pListFilter page. Manipulating the page argument can overflow the stack, allowing an attacker to execute arbitrary code on the device. The attack can be performed remotely and the exploit has been made publicly available, indicating a legitimate threat channel.

Affected Systems

The affected device is the Tenda FH1202 home router. The vulnerable firmware version is 1.2.0.14(408). No other Tenda products or firmware revisions are listed as affected.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, and the EPSS score of less than 1% suggests that, despite high impact, the likelihood of real‑world exploitation is currently very low. The vulnerability is not listed in the CISA KEV catalog at this time. Nevertheless, because the flaw permits remote exploitation via a known HTTP endpoint, any exposed infrastructure could be compromised if an attacker gains access to the router’s management interface.

Generated by OpenCVE AI on April 16, 2026 at 10:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Tenda firmware that fixes the P2pListFilter buffer overflow (check the official Tenda support site for an update).
  • If no patch is yet available, block or disable the /goform/P2pListFilter endpoint by adding firewall rules or disabling remote configuration features that expose the page argument.
  • Restrict remote administrative access to trusted IP addresses or require VPN use, and employ network segmentation to limit the exposure of the router’s management interface.

Generated by OpenCVE AI on April 16, 2026 at 10:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh1202
CPEs cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*
Vendors & Products Tenda fh1202

Mon, 09 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.
Title Tenda FH1202 P2pListFilter fromP2pListFilter stack-based overflow
First Time appeared Tenda
Tenda fh1202 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh1202_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh1202 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh1202 Fh1202 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-09T18:16:40.169Z

Reserved: 2026-03-08T16:22:56.760Z

Link: CVE-2026-3811

cve-icon Vulnrichment

Updated: 2026-03-09T18:16:31.657Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T09:16:03.190

Modified: 2026-03-09T15:26:21.790

Link: CVE-2026-3811

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:30:16Z

Weaknesses