Description
A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument index/GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

The vulnerability exists in the formwrlSSIDset function exposed via the /goform/wifiSSIDset endpoint of Tenda i3 firmware. Malicious manipulation of the index/GO argument leads to a stack-based buffer overflow. According to the vendor description, remote exploitation is possible, which may allow an attacker to execute arbitrary code or otherwise compromise the device's confidentiality and integrity.

Affected Systems

The affected product is Tenda i3, specifically firmware version 1.0.0.6 (2204). No other versions are listed as vulnerable.

Risk and Exploitability

The CVSS score is 8.7, indicating high severity, and the EPSS score is less than 1%, suggesting a low likelihood of exploitation in the wild. The vulnerability is not yet listed in the CISA KEV catalog. Exploitation requires remote access to the device's web interface and input manipulation, making it a remote vulnerability that could lead to remote code execution if successfully exploited.

Generated by OpenCVE AI on March 18, 2026 at 15:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Tenda's website or support portal for a firmware patch that addresses the buffer overflow.
  • Apply the latest firmware update as soon as it becomes available.
  • If no patch is available, restrict or disable access to the /goform/wifiSSIDset endpoint through firewall rules or network segmentation.

Generated by OpenCVE AI on March 18, 2026 at 15:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:i3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i3_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i3
Vendors & Products Tenda i3

Thu, 12 Mar 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument index/GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Title Tenda i3 wifiSSIDset formwrlSSIDset stack-based overflow
First Time appeared Tenda
Tenda i3 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:i3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i3 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T16:22:19.352Z

Reserved: 2026-03-11T13:51:37.956Z

Link: CVE-2026-3971

cve-icon Vulnrichment

Updated: 2026-03-12T16:22:16.493Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T01:15:55.650

Modified: 2026-04-02T20:09:06.150

Link: CVE-2026-3971

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:19Z

Weaknesses