Description
A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impacted element is the function formwrlSSIDget of the file /goform/wifiSSIDget. Such manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

Tenda i12 firmware version 1.0.0.6(2204) contains a stack‑based buffer overflow in the formwrlSSIDget function of the /goform/wifiSSIDget interface. The overflow is triggered by manipulating the argument index; this allows an attacker to corrupt the stack, potentially leading to arbitrary code execution or denial of service. The weakness is classified under CWE‑119 and CWE‑121, indicating a classic buffer overflow and stack-based exploitation scenario.

Affected Systems

The affected product is the Tenda i12 router, specifically firmware releases 1.0.0.6(2204). No other products or versions are listed as impacted according to the dataset.

Risk and Exploitability

The CVSS base score is 8.7, reflecting severe impact. EPSS indicates that the probability of exploitation is currently below 1%, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation in the wild. However, the attack vector is remote, as the flaw lives in a web‑accessible form, and the public exploit has been disclosed. Attackers can trigger the overflow by sending crafted requests to the vulnerable endpoint from an external network.

Generated by OpenCVE AI on March 18, 2026 at 15:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Tenda website (https://www.tenda.com.cn/) for updated firmware that addresses the flaw.
  • If a patched firmware version is available, download and install it immediately to eliminate the overflow vulnerability.
  • If no patch is currently released, consider blocking access to the /goform/wifiSSIDget endpoint from external networks as a temporary isolation measure.

Generated by OpenCVE AI on March 18, 2026 at 15:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i12_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i12
Vendors & Products Tenda i12

Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impacted element is the function formwrlSSIDget of the file /goform/wifiSSIDget. Such manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Title Tenda i12 wifiSSIDget formwrlSSIDget stack-based overflow
First Time appeared Tenda
Tenda i12 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:i12_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i12 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T15:45:09.135Z

Reserved: 2026-03-12T08:30:12.424Z

Link: CVE-2026-4043

cve-icon Vulnrichment

Updated: 2026-03-12T15:45:02.837Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T16:16:11.600

Modified: 2026-04-02T20:04:11.387

Link: CVE-2026-4043

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:49:39Z

Weaknesses