Description
A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwrlSSIDget of the file /goform/wifiSSIDget. Executing a manipulation of the argument index can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the formwrlSSIDget function of Tenda i3 firmware 1.0.0.6(2204). Manipulating the index argument can overflow the buffer and corrupt the stack, enabling an attacker to execute arbitrary code. The vulnerability is tied to CWE-119 and CWE-121 and has been publicly exploited, meaning code execution is a realistic outcome when the remote attack is successful.

Affected Systems

The affected product is the Tenda i3 router running firmware version 1.0.0.6(2204). No other versions are explicitly mentioned as vulnerable in the provided data, so users should verify their firmware against this identifier.

Risk and Exploitability

The CVSS score is 8.7, indicating a high severity risk. EPSS is reported as less than 1%, suggesting a low probability of exploitation in the near term, though the vulnerability is present in the wild and an exploit has been published. It is not listed in the CISA KEV catalog. The attack vector is remote, likely over the network, targeting the device’s web interface. Given the availability of a published exploit, the risk remains significant, especially if the router is exposed to untrusted networks.

Generated by OpenCVE AI on March 18, 2026 at 15:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the current firmware version on the router via its web interface.
  • Download the latest firmware Tenda’s official website.
  • Upload and apply the new firmware to the device following vendor instructions.
  • Confirm the firmware update succeeded and test that the /goform/wifiSSIDget endpoint no longer allows access.
  • If immediate firmware upgrade is not possible, restrict external access to the router’s management interfaces or block the /goform endpoint from untrusted networks.

Generated by OpenCVE AI on March 18, 2026 at 15:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:i3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i3_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i3
Vendors & Products Tenda i3

Thu, 12 Mar 2026 01:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwrlSSIDget of the file /goform/wifiSSIDget. Executing a manipulation of the argument index can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Title Tenda i3 wifiSSIDget formwrlSSIDget stack-based overflow
First Time appeared Tenda
Tenda i3 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:i3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i3 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T16:21:58.457Z

Reserved: 2026-03-11T13:51:35.144Z

Link: CVE-2026-3970

cve-icon Vulnrichment

Updated: 2026-03-12T16:21:55.976Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T01:15:55.420

Modified: 2026-04-02T20:09:15.210

Link: CVE-2026-3970

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:20Z

Weaknesses