Description
A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impacted element is the function formwrlSSIDget of the file /goform/wifiSSIDget. Such manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the formwrlSSIDget function of the /goform/wifiSSIDget interface on the Tenda i12 router. By supplying an invalid argument index the function overflows a stack buffer, potentially allowing an attacker to overwrite control data and achieve arbitrary code execution. This type of flaw compromises confidentiality, integrity, and availability of the device and any connected network resources.

Affected Systems

Affected devices are Tenda i12 routers running firmware version 1.0.0.6(2204). The flaw exists in the Tenda i12 Wi‑Fi module and is exploitable through the wireless management interface exposed by the router.

Risk and Exploitability

The flaw has a CVSS score of 8.7, indicating high severity. The EPSS score is less than 1%, implying low probability of widespread exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog. However, the vulnerability can be triggered remotely via HTTP requests to the router’s web interface, and the publicly disclosed exploit suggests that attackers could remotely gain code execution on the device.

Generated by OpenCVE AI on April 2, 2026 at 23:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router to the latest firmware provided by Tenda, ensuring the version no longer contains the stack overflow in formwrlSSIDget.
  • If a firmware update is unavailable, restrict access to the router’s web management interface by firewall rules or disable remote configuration.
  • Maintain the router on a separate VLAN or network segment to limit potential damage if exploitation occurs.

Generated by OpenCVE AI on April 2, 2026 at 23:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i12_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i12
Vendors & Products Tenda i12

Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impacted element is the function formwrlSSIDget of the file /goform/wifiSSIDget. Such manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Title Tenda i12 wifiSSIDget formwrlSSIDget stack-based overflow
First Time appeared Tenda
Tenda i12 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:i12_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i12 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T15:45:09.135Z

Reserved: 2026-03-12T08:30:12.424Z

Link: CVE-2026-4043

cve-icon Vulnrichment

Updated: 2026-03-12T15:45:02.837Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T16:16:11.600

Modified: 2026-04-02T20:04:11.387

Link: CVE-2026-4043

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:28Z

Weaknesses