Description
A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be performed from remote. The exploit is publicly available and might be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the /goform/exeCommand HTTP endpoint of Tenda W3 routers. The vulnerability is triggered by an overlong cmdinput argument, allowing an attacker to corrupt the stack and potentially execute arbitrary code or crash the device. The flaw is rooted in unsafe string handling and buffer boundary checks.

Affected Systems

The issue affects Tenda W3 models running firmware version 1.0.0.3(2204). No other firmware versions or devices are reported as affected. The vulnerability is limited to the HTTP Handler component handling the formexeCommand function, accessible through the router’s web interface.

Risk and Exploitability

The CVSS score of 8.7 demonstrates high severity, while the EPSS score of less than 1% indicates that exploit attempts are currently rare. The vulnerability is not listed in CISA’s KEV catalog, suggesting no widespread known exploitation. Attackers can reach the vulnerable endpoint from any remote host on the network, sending crafted HTTP requests to trigger the overflow. To mitigate this, users should promptly apply any vendor-published firmware updates and promptly block or disable remote access to the affected endpoint if an update is unavailable.

Generated by OpenCVE AI on April 2, 2026 at 23:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update provided by Tenda that addresses the /goform/exeCommand vulnerability.
  • If no update is available, restrict or block remote access to the router’s web interface, especially the /goform/exeCommand path, using network firewalls or router ACLs.
  • Disable remote HTTP management altogether if remote configuration is not required.
  • Monitor router logs for abnormal or repeated attempts to access /goform/exeCommand and investigate any suspicious activity.

Generated by OpenCVE AI on April 2, 2026 at 23:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda w3 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
Vendors & Products Tenda w3 Firmware

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w3
Vendors & Products Tenda
Tenda w3

Thu, 12 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be performed from remote. The exploit is publicly available and might be used.
Title Tenda W3 HTTP exeCommand formexeCommand stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T13:15:30.976Z

Reserved: 2026-03-11T14:01:24.436Z

Link: CVE-2026-3974

cve-icon Vulnrichment

Updated: 2026-03-12T13:15:27.550Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T03:15:58.120

Modified: 2026-04-02T20:07:48.327

Link: CVE-2026-3974

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:34Z

Weaknesses