Description
A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the Tenda W3 firmware 1.0.0.3(2204) when the POST parameter wifiSSIDget is supplied with a malicious index value. The overflow can be triggered remotely by sending a crafted HTTP request to the /goform/wifiSSIDget endpoint. If exploited, an attacker could corrupt the stack, potentially gaining arbitrary code execution or causing a denial of service. The weakness falls under the common weaknesses CWE‑119, CWE‑121 and CWE‑787.

Affected Systems

The only affected product identified in the CNA data is Tenda W3, specifically the device running firmware version 1.0.0.3(2204). No other Tenda models or firmware revisions are listed as affected.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, and the EPSS score of less than 1 % suggests a low probability of exploitation in the wild at present. The vulnerability is not cataloged in the CISA KEV listing, indicating no known public exploit has yet entered that registry. An attacker can exploit the flaw remotely over the network by directing a POST request to the management interface, which is insufficient to limit access. If an attacker succeeds, they could execute arbitrary code or crash the device, compromising confidentiality, integrity, and availability of the network it serves.

Generated by OpenCVE AI on April 2, 2026 at 23:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the model and firmware revision of your Tenda W3 device.
  • Apply any vendor‑released firmware update that addresses the stack‑based buffer overflow; if one is not yet available, request an update from the manufacturer.
  • As a temporary safeguard, restrict external access to the device’s management interface via firewall rules or disable remote management until a patch is applied.

Generated by OpenCVE AI on April 2, 2026 at 23:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda w3 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
Vendors & Products Tenda w3 Firmware

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w3
Vendors & Products Tenda
Tenda w3

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 07:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Title Tenda W3 POST Parameter wifiSSIDget stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T14:23:03.456Z

Reserved: 2026-03-11T18:58:11.145Z

Link: CVE-2026-4007

cve-icon Vulnrichment

Updated: 2026-03-12T14:22:59.460Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T07:16:18.583

Modified: 2026-04-02T20:07:11.523

Link: CVE-2026-4007

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:31Z

Weaknesses