Description
A security flaw has been discovered in Tenda i12 1.0.0.6(2204). Impacted is the function vos_strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow was discovered in the Tenda i12 router firmware version 1.0.0.6(2204). The flaw originates in the vos_strcpy routine that processes the cmdinput parameter in the /goform/exeCommand endpoint. By supplying an oversized payload, an attacker can corrupt the stack and potentially execute arbitrary code, resulting in full remote compromise of the device. The weakness corresponds to common buffer overflow conditions (CWE‑119, CWE‑121, CWE‑787).

Affected Systems

The vulnerability affects the Tenda i12 series of wireless routers when running firmware 1.0.0.6(2204). All devices that have not upgraded beyond this firmware level expose the vulnerable /goform/exeCommand handler and are susceptible to remote exploitation.

Risk and Exploitability

The flaw is rated high on the CVSS scale with a score of 8.7, underscoring its severity. However, the EPSS score is below 1%, indicating a low probability of widespread exploitation at present. Publicly released exploits are available, and the attack can be launched remotely over the network, likely via HTTP requests to the exposed endpoint. Because the condition is purely remote and requires no user interaction, it poses a significant risk to any exposed router. The vulnerability is not listed in the CISA KEV catalog, but its high impact warrants immediate attention.

Generated by OpenCVE AI on April 2, 2026 at 23:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by Tenda that addresses the buffer overflow in vos_strcpy.
  • If no patch is available, block external access to the /goform/exeCommand endpoint using firewall rules or access controls.
  • Isolate the device from untrusted or external networks if possible to reduce exposure.
  • Monitor the device for anomalous traffic to /goform/exeCommand and review logs for signs of exploitation attempts.
  • Contact Tenda support for guidance or to request a security fix if one is not already issued.

Generated by OpenCVE AI on April 2, 2026 at 23:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i12_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i12
Vendors & Products Tenda i12

Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda i12 1.0.0.6(2204). Impacted is the function vos_strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
Title Tenda i12 exeCommand vos_strcpy stack-based overflow
First Time appeared Tenda
Tenda i12 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:i12_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i12 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T15:34:55.150Z

Reserved: 2026-03-12T08:29:58.398Z

Link: CVE-2026-4041

cve-icon Vulnrichment

Updated: 2026-03-12T15:34:51.304Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T15:16:33.550

Modified: 2026-04-02T20:05:05.733

Link: CVE-2026-4041

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:30Z

Weaknesses