Description
A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.
Published: 2026-03-29
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack‑based buffer overflow in the formWrlExtraSet function of the Tenda FH1201 router firmware. By sending a crafted GO parameter to the /goform/WrlExtraSet endpoint, an attacker can overflow the stack and potentially execute arbitrary code. The flaw is an instance of the CWE‑119 (Buffer Overflow) and CWE‑121 (Stack-based Buffer Overflow) weaknesses. If exploited, the attacker could gain complete control over the device, compromising confidentiality, integrity and availability.

Affected Systems

The affected device is the Tenda FH1201 residential router running firmware version 1.2.0.14(408). Vim is present in the firmware of all units distributed with this version of firmware, including those whose CPE identifiers match cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14(408).* . Users of older or later firmware revisions are not listed as affected, so the impact is limited to the specified revision.

Risk and Exploitability

The CVSS base score of 8.7 denotes a high severity, and the risk is compounded by the fact that the attack can be performed from remote without authentication. The EPSS score is below 1 %, indicating that widespread exploitation is currently unlikely, yet the published exploit and the availability of a publicly‑accessible endpoint mean that a determined adversary could still target vulnerable routers. The vulnerability is not recorded in the CISA KEV catalog, but its exploitation potential warrants proactive remediation.

Generated by OpenCVE AI on March 30, 2026 at 17:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Tenda support website for a firmware update that addresses the buffer overflow in the /goform/WrlExtraSet handler.
  • Download and install the latest firmware version on all affected FH1201 routers.
  • Verify that the firmware upgrade is successfully applied by confirming the new firmware version via the router’s web interface.
  • Optionally, restrict external access to the router’s web interface or block the /goform/WrlExtraSet endpoint using a firewall or ACL to reduce the attack surface until a patch is applied.

Generated by OpenCVE AI on March 30, 2026 at 17:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:fh1201:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh1201
Vendors & Products Tenda fh1201

Sun, 29 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.
Title Tenda FH1201 Parameter WrlExtraSet formWrlExtraSet stack-based overflow
First Time appeared Tenda
Tenda fh1201 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh1201_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh1201 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh1201 Fh1201 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T14:10:52.945Z

Reserved: 2026-03-27T16:38:43.621Z

Link: CVE-2026-5046

cve-icon Vulnrichment

Updated: 2026-03-30T14:10:48.437Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T15:16:36.990

Modified: 2026-03-30T15:46:16.660

Link: CVE-2026-5046

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:47Z

Weaknesses