Description
A vulnerability was determined in Tenda FH1202 1.2.0.14. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. Executing a manipulation of the argument Go can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the Tenda FH1202 firmware 1.2.0.14, triggered by manipulating the Go argument to the fromWrlclientSet function in httpd. The overflow could allow an attacker to execute arbitrary code on the device, compromising confidentiality, integrity and availability of the router. The description states that the attack may be launched remotely and the exploit is publicly disclosed.

Affected Systems

Tenda FH1202 routers running firmware version 1.2.0.14 are affected. No other firmware revisions are listed in the current definition.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity and the EPSS score of less than 1% suggests a presently low likelihood of exploitation, although the existence of publicly available exploits makes the risk significant in practice. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be a remote HTTP request to /goform/WrlclientSet, requiring the attacker to send a crafted Go parameter. The combination of high severity and remote reach warrants immediate attention.

Generated by OpenCVE AI on April 28, 2026 at 05:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tenda FH1202 firmware to a version that contains the fix, as proposed by the vendor.
  • If an immediate firmware update is not possible, block or disable the /goform/WrlclientSet endpoint using the router’s firewall or access‑control settings to prevent remote exploitation.
  • Configure network segmentation or firewall rules to limit external access to the router, ensuring that only trusted internal networks can reach the affected HTTP service.

Generated by OpenCVE AI on April 28, 2026 at 05:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh1202
Vendors & Products Tenda fh1202

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 11:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda FH1202 1.2.0.14. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. Executing a manipulation of the argument Go can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda FH1202 httpd WrlclientSet fromWrlclientSet stack-based overflow
First Time appeared Tenda
Tenda fh1202 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh1202_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh1202 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh1202 Fh1202 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:10:58.801Z

Reserved: 2026-04-25T14:22:57.920Z

Link: CVE-2026-7035

cve-icon Vulnrichment

Updated: 2026-04-27T13:10:55.247Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T12:16:22.797

Modified: 2026-04-30T14:10:32.337

Link: CVE-2026-7035

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:30:23Z

Weaknesses