Description
A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the formWifiMacFilterSet handler of the Tenda W3 router. A crafted POST request to the /goform/WifiMacFilterSet endpoint can overwrite critical stack memory, enabling an attacker to execute arbitrary code. Public exploits demonstrate that the overflow can be triggered remotely, potentially allowing full control of the device.

Affected Systems

The vulnerability affects Tenda W3 routers running firmware version 1.0.0.3(2204). The flaw resides in the POST Parameter Handler component that exposes the /goform/WifiMacFilterSet endpoint via the web interface. Devices using the stated firmware revision are at risk if the endpoint is reachable from a network.

Risk and Exploitability

The CVSS score of 8.7 signals high severity, yet the EPSS score below 1% indicates a low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog, but publicly available exploits exist on GitHub. Attackers can exploit the flaw remotely through the web interface, so any host with network access to the router could target it. Overall, the risk is moderate to high, depending on network exposure and threat actor motivation.

Generated by OpenCVE AI on April 3, 2026 at 00:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that resolves the /goform/WifiMacFilterSet buffer overflow.
  • If no update is available, restrict external access to the router’s web interface or disable the formWifiMacFilterSet feature.
  • Verify the firmware version after the update and confirm the vulnerability is mitigated.
  • Monitor the device for anomalous activity or repeated failed POST attempts to /goform/WifiMacFilterSet.

Generated by OpenCVE AI on April 3, 2026 at 00:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda w3 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
Vendors & Products Tenda w3 Firmware

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w3
Vendors & Products Tenda
Tenda w3

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda W3 POST Parameter WifiMacFilterSet formWifiMacFilterSet stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T14:42:16.574Z

Reserved: 2026-03-11T14:01:30.458Z

Link: CVE-2026-3976

cve-icon Vulnrichment

Updated: 2026-03-12T14:42:13.310Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T03:15:58.740

Modified: 2026-04-02T20:07:27.937

Link: CVE-2026-3976

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:32Z

Weaknesses