Description
A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component Parameter Handler. Performing a manipulation of the argument GO results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.
Published: 2026-03-29
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the WrlclientSet function of the Tenda FH1201 firmware 1.2.0.14(408). By manipulating the GO argument sent to the /goform/WrlclientSet endpoint, an attacker can overflow a stack buffer, potentially allowing arbitrary code execution or causing a crash. The vulnerability is exploitable remotely and public proofs of concept are available, indicating a realistic threat for devices exposed to unauthenticated network traffic.

Affected Systems

The flaw affects the Tenda FH1201 router running firmware 1.2.0.14(408). No other firmware releases were explicitly listed as vulnerable. The issue resides in the Parameter Handler component accessed via the device’s web interface.

Risk and Exploitability

The CVSS score of 8.7 places the vulnerability in the high severity range, while the EPSS score below 1% suggests low current exploitation prevalence, though the public nature of the exploit increases risk over time. The attack vector is inferred to be remote, likely from the internet or untrusted local networks, through the HTTP management interface. As the vulnerability is listed as not in the CISA KEV catalog, it has not yet been officially recognized as a widely exploited threat, but its potential for remote code execution warrants immediate attention.

Generated by OpenCVE AI on March 30, 2026 at 17:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the FH1201 firmware to the latest version released by Tenda shortly after patching, confirming the new build no longer contains the vulnerable 1.2.0.14(408) code.
  • If an updated firmware is not yet available, disable remote configuration access or block the WrlclientSet management interface from external networks to prevent attackers from reaching the vulnerable endpoint.
  • Continuously monitor device logs for suspicious activity patterns on the web management interface and consider implementing network segmentation or firewall rules to limit exposure to untrusted traffic.

Generated by OpenCVE AI on March 30, 2026 at 17:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:fh1201:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh1201
Vendors & Products Tenda fh1201

Sun, 29 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component Parameter Handler. Performing a manipulation of the argument GO results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.
Title Tenda FH1201 Parameter WrlclientSet stack-based overflow
First Time appeared Tenda
Tenda fh1201 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh1201_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh1201 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh1201 Fh1201 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T15:35:12.209Z

Reserved: 2026-03-27T16:38:40.454Z

Link: CVE-2026-5045

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T14:16:32.547

Modified: 2026-03-30T15:46:42.200

Link: CVE-2026-5045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:48Z

Weaknesses