Description
A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument index/GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via stack-based buffer overflow
Action: Patch Now
AI Analysis

Impact

A stack-based buffer overflow exists in the formwrlSSIDset function of the /goform/wifiSSIDset handler on the Tenda i3 device. An attacker can manipulate the index/GO parameter to overflow a stack buffer, potentially allowing the execution of arbitrary code on the device. This weakness is a classic instance of out-of-bounds write leading to code execution.

Affected Systems

The vulnerability is known to affect the Tenda i3 router running firmware version 1.0.0.6(2204). The affected vendor is Tenda and the product model is i3. No other models or firmware revisions are specified as impacted.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity. The EPSS score is below 1%, suggesting low current exploit prevalence, and the vulnerability is not listed in the CISA KEV catalog. Remote exploitation is possible through the router’s web interface, and thus an attacker with network access to the router’s management interface can trigger the overflow. The attack vector is inferred to be a remote web request exploiting the formwrlSSIDset function.

Generated by OpenCVE AI on April 2, 2026 at 23:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that removes the buffer overflow in formwrlSSIDset.
  • If no patch is available, disable the /goform/wifiSSIDset endpoint or block the router’s web interface from untrusted networks with a firewall.
  • Restrict access to the router’s administrative interface to trusted hosts only.
  • Change the default administrative credentials and regularly review access logs for suspicious activity.

Generated by OpenCVE AI on April 2, 2026 at 23:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:i3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i3_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i3
Vendors & Products Tenda i3

Thu, 12 Mar 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument index/GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Title Tenda i3 wifiSSIDset formwrlSSIDset stack-based overflow
First Time appeared Tenda
Tenda i3 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:i3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i3 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T16:22:19.352Z

Reserved: 2026-03-11T13:51:37.956Z

Link: CVE-2026-3971

cve-icon Vulnrichment

Updated: 2026-03-12T16:22:16.493Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T01:15:55.650

Modified: 2026-04-02T20:09:06.150

Link: CVE-2026-3971

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T10:03:02Z

Weaknesses