Description
A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow occurs in the Tenda W3 firmware 1.0.0.3(2204) when processing the POST /goform/wifiSSIDset endpoint. The vulnerability arises from improper handling of the index/GO argument, creating a buffer that overflows the stack. This weakness is identified as CWE-119 and CWE-121. The impact can include arbitrary code execution or a denial‑of‑service condition on the affected device due to the corrupted stack.

Affected Systems

The affected device is the Tenda W3 wireless router. The specific firmware version identified as vulnerable is 1.0.0.3(2204). No other versions are listed in the available data.

Risk and Exploitability

The vulnerability has a CVSS score of 8.7, indicating high severity. The EPSS score is reported as less than 1% and the vulnerability is not listed in the CISA KEV catalog. The description explicitly states that the attack can be launched remotely, indicating the attack vector is through network access to the router’s web interface via an HTTP POST request to /goform/wifiSSIDset. Published exploit code is available on GitHub, demonstrating that the flaw has been publicly exploited. The risk to impacted systems is significant, especially if the router is exposed to untrusted networks.

Generated by OpenCVE AI on March 18, 2026 at 15:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Tenda website or vendor portal for an updated firmware that addresses the stack buffer overflow. If available, download and install the new firmware according to the manufacturer's instructions. When no patch exists, block remote access to the /goform/wifiSSIDset endpoint using a firewall or access control list to reduce the attack surface. Monitor router logs and network traffic for suspicious POST requests targeting /goform/wifiSSIDset to detect potential exploitation attempts.

Generated by OpenCVE AI on March 18, 2026 at 15:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda w3 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
Vendors & Products Tenda w3 Firmware

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w3
Vendors & Products Tenda
Tenda w3

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 07:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.
Title Tenda W3 POST Parameter wifiSSIDset stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T14:12:01.539Z

Reserved: 2026-03-11T18:58:17.156Z

Link: CVE-2026-4008

cve-icon Vulnrichment

Updated: 2026-03-12T14:08:05.109Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T07:16:18.827

Modified: 2026-04-02T20:06:28.757

Link: CVE-2026-4008

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:50:03Z

Weaknesses