Description
A weakness has been identified in Tenda i12 1.0.0.6(2204). The affected element is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. This manipulation of the argument index causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the formWifiMacFilterGet handler of Tenda i12 firmware 1.0.0.6(2204). A malformed argument index can overflow a stack buffer, allowing an attacker to corrupt control data and execute arbitrary code. This flaw is a classic stack-based buffer overflow (CWE‑119, CWE‑121, CWE‑787) and, if exploited, would provide the attacker with full control over the router device.

Affected Systems

Affected devices are Tenda i12 routers running firmware release 1.0.0.6(2204). No other Tenda products or firmware versions are listed as vulnerable.

Risk and Exploitability

The CVSS score of 8.7 denotes high severity, and though the EPSS probability is low (<1%) the flaw is publicly exploitable via the /goform/WifiMacFilterGet web endpoint. The exploit can be launched remotely without authentication, and the vulnerability is not currently in the CISA KEV catalog. An attacker could trigger the overflow from outside the local network, achieve remote code execution, and compromise the entire router.

Generated by OpenCVE AI on April 2, 2026 at 23:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router to the latest Tenda i12 firmware released after 1.0.0.6(2204).
  • If a firmware update is not yet available, block or restrict access to the /goform/WifiMacFilterGet endpoint or disable the MAC filter feature through the router's settings.
  • Continuously monitor the device for suspicious outbound traffic and apply network segmentation or firewall rules to limit potential lateral movement from a compromised router.

Generated by OpenCVE AI on April 2, 2026 at 23:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i12_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i12
Vendors & Products Tenda i12

Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda i12 1.0.0.6(2204). The affected element is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. This manipulation of the argument index causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda i12 WifiMacFilterGet formWifiMacFilterGet stack-based overflow
First Time appeared Tenda
Tenda i12 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:i12_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i12 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T15:34:00.209Z

Reserved: 2026-03-12T08:30:09.168Z

Link: CVE-2026-4042

cve-icon Vulnrichment

Updated: 2026-03-12T15:33:54.625Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T15:16:34.180

Modified: 2026-04-02T20:04:42.220

Link: CVE-2026-4042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:29Z

Weaknesses