Description
A vulnerability was found in Tenda W3 1.0.0.3(2204). Affected by this issue is the function formSetCfm of the file /goform/setcfm of the component HTTP Handler. The manipulation of the argument funcpara1 results in stack-based buffer overflow. The attack can only be performed from the local network. The exploit has been made public and could be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Tenda W3 routers running firmware 1.0.0.3(2204) contain a stack‑based buffer overflow in the HTTP handler function formSetCfm. The flaw is triggered by submitting a specially crafted value in the funcpara1 argument to the /goform/setcfm URL. When triggered it can corrupt the execution stack and lead to arbitrary code execution on the device. Because the vulnerability resides in the HTTP interface only, impact is confined to devices that are reachable locally, but compromise would give an attacker full control of the router.

Affected Systems

Affected product is the Tenda W3 wireless router. Only the firmware version 1.0.0.3(2204) is known to include the vulnerability. Other Tenda devices and firmware revisions are not mentioned in the data.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, while the EPSS score of less than 1 percent suggests a low probability of widespread exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. An attacker would need to first gain access to the local network to send the crafted request. The publicly disclosed exploit demonstrates the feasibility of the attack, but it requires local network connectivity and is therefore limited in scope.

Generated by OpenCVE AI on April 2, 2026 at 23:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that removes the flaw.
  • If an update is unavailable, block external access to the /goform/setcfm endpoint via firewall or router ACLs.
  • Restrict network access to the router by segmenting the local network and limiting connectivity for untrusted devices.
  • Monitor device logs for signs of exploitation attempts, such as unexpected traffic to the /goform/setcfm URL.

Generated by OpenCVE AI on April 2, 2026 at 23:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda w3 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
Vendors & Products Tenda w3 Firmware

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w3
Vendors & Products Tenda
Tenda w3

Thu, 12 Mar 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda W3 1.0.0.3(2204). Affected by this issue is the function formSetCfm of the file /goform/setcfm of the component HTTP Handler. The manipulation of the argument funcpara1 results in stack-based buffer overflow. The attack can only be performed from the local network. The exploit has been made public and could be used.
Title Tenda W3 HTTP setcfm formSetCfm stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:A/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T16:23:07.504Z

Reserved: 2026-03-11T14:01:12.210Z

Link: CVE-2026-3972

cve-icon Vulnrichment

Updated: 2026-03-12T16:23:04.734Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T02:15:58.607

Modified: 2026-04-02T20:08:56.470

Link: CVE-2026-3972

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:36Z

Weaknesses