Description
A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be performed from remote. The exploit is publicly available and might be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch ASAP
AI Analysis

Impact

The Tenda W3 router version 1.0.0.3(2204) contains a stack‑based buffer overflow in the formexeCommand function of the /goform/exeCommand HTTP handler. Manipulating the cmdinput argument can overflow the stack, potentially allowing an attacker to execute arbitrary code on the device. The vulnerability is identified as CWE‑119 and CWE‑121, both describing buffer overflows. The impact is that a remote attacker could compromise the router’s integrity and confidentiality, leading to full control of the device.

Affected Systems

Vendor: Tenda, Product: W3 router. Affected version: 1.0.0.3(2204). No other versions are listed as affected.

Risk and Exploitability

The CVSS v3 score is 8.7, indicating a high severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the near term, but the vulnerability is publicly available and may be actively used. The exploit can be performed remotely, and the CVE is not listed in CISA’s KEV catalog. The known public exploits on GitHub and VULDB demonstrate that the attack vector is feasible without special conditions.

Generated by OpenCVE AI on March 18, 2026 at 15:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Tenda website or official channels for a firmware update that addresses the buffer overflow.
  • If a patch is unavailable, block external access to the router’s HTTP interface or place the device behind a firewall that restricts the /goform/exeCommand endpoint.
  • Consider disabling the exeCommand functionality if the router administration requires it; consult vendor documentation for alternative management methods.

Generated by OpenCVE AI on March 18, 2026 at 15:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda w3 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
Vendors & Products Tenda w3 Firmware

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w3
Vendors & Products Tenda
Tenda w3

Thu, 12 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be performed from remote. The exploit is publicly available and might be used.
Title Tenda W3 HTTP exeCommand formexeCommand stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T13:15:30.976Z

Reserved: 2026-03-11T14:01:24.436Z

Link: CVE-2026-3974

cve-icon Vulnrichment

Updated: 2026-03-12T13:15:27.550Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T03:15:58.120

Modified: 2026-04-02T20:07:48.327

Link: CVE-2026-3974

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:14Z

Weaknesses