Description
A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwrlSSIDget of the file /goform/wifiSSIDget. Executing a manipulation of the argument index can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack‑based buffer overflow in the formwrlSSIDget function exposed at /goform/wifiSSIDget on Tenda i3 firmware 1.0.0.6(2204). Manipulating the argument index can corrupt the stack and may allow an attacker to execute arbitrary code. The flaw falls under CWE‑119, CWE‑121, and CWE‑787 and can lead to compromise of confidentiality, integrity, and availability of the device and any network it connects to.

Affected Systems

Affected devices are Tenda i3 routers running firmware version 1.0.0.6(2204). The attack vector is through a remote web interface that accepts an index parameter, so the compromise can occur over the network without local access.

Risk and Exploitability

The CVSS score of 8.7 classifies the flaw as high severity. EPSS indicates a very low current exploit probability (<1%), yet the exploit has already been published. The vulnerability is not listed in CISA KEV, but the presence of a public exploit and remote trigger elevate the risk. An attacker with network access to the device could trigger the overflow, potentially leading to remote code execution.

Generated by OpenCVE AI on April 2, 2026 at 23:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Tenda i3 firmware update that contains the patch for the buffer overflow.
  • If no patch is available, block or restrict access to the /goform/wifiSSIDget endpoint via firewall or router settings.
  • Configure the router to disable remote web management or limit it to trusted IP addresses.
  • Monitor the router logs for abnormal requests to the SSID get function and investigate any anomalies.

Generated by OpenCVE AI on April 2, 2026 at 23:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:i3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i3_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i3
Vendors & Products Tenda i3

Thu, 12 Mar 2026 01:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwrlSSIDget of the file /goform/wifiSSIDget. Executing a manipulation of the argument index can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Title Tenda i3 wifiSSIDget formwrlSSIDget stack-based overflow
First Time appeared Tenda
Tenda i3 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:i3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i3 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T16:21:58.457Z

Reserved: 2026-03-11T13:51:35.144Z

Link: CVE-2026-3970

cve-icon Vulnrichment

Updated: 2026-03-12T16:21:55.976Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T01:15:55.420

Modified: 2026-04-02T20:09:15.210

Link: CVE-2026-3970

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T10:03:03Z

Weaknesses