Description
A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack‐based buffer overflow that occurs in the formWifiMacFilterSet endpoint of the Tenda W3 router firmware (1.0.0.3(2204)). A malicious user can construct a POST request with an out‑of‑bounds value for the argument index/GO, causing a buffer overflow. This enables the attacker to overwrite the stack, potentially injecting arbitrary code and gaining full control of the device. The weakness is classified as CWE‑119 and CWE‑121.

Affected Systems

Affected systems are Tenda W3 routers running firmware version 1.0.0.3(2204). No other versions are listed as vulnerable, so only devices with this exact firmware revision are at risk.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, and the EPSS score of less than 1% suggests low likelihood of widespread exploitation, but the flaw can be triggered remotely without authentication. The vulnerability is not catalogued by CISA KEV, but public exploit code is available. Administrators of Tenda W3 routers should assess whether the device is exposed to the internet and apply the appropriate fix or mitigation.

Generated by OpenCVE AI on March 18, 2026 at 15:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest Tenda W3 release that eliminates the formWifiMacFilterSet buffer overflow.
  • If a firmware update is not yet available, block external access to the router’s web administration interface or disable remote management.
  • Disable the Wi‑Fi MAC filter feature or remove the POST route to /goform/WifiMacFilterSet if possible.
  • Enable logging and monitor for abnormal POST traffic to /goform/WifiMacFilterSet and consider filtering by source IP.
  • Verify device firmware version after applying the patch to ensure the vulnerability has been remediated.

Generated by OpenCVE AI on March 18, 2026 at 15:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda w3 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
Vendors & Products Tenda w3 Firmware

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w3
Vendors & Products Tenda
Tenda w3

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda W3 POST Parameter WifiMacFilterSet formWifiMacFilterSet stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T14:42:16.574Z

Reserved: 2026-03-11T14:01:30.458Z

Link: CVE-2026-3976

cve-icon Vulnrichment

Updated: 2026-03-12T14:42:13.310Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T03:15:58.740

Modified: 2026-04-02T20:07:27.937

Link: CVE-2026-3976

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:09Z

Weaknesses