Description
A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the function fromGetWifiGuestBasic of the file /goform/WifiGuestSet. Executing a manipulation of the argument guestWrlPwd/guestEn/guestSsid/hideSsid/guestSecurity can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
Problem types
Product status
Timeline
| 2026-01-22: | Advisory disclosed |
| 2026-01-22: | VulDB entry created |
| 2026-01-24: | VulDB entry last update |
Credits
wlupus (VulDB User)
References
vuldb.com/?id.342305 (VDB-342305 | Tenda AX1803 WifiGuestSet fromGetWifiGuestBasic stack-based overflow)
vuldb.com/?ctiid.342305 (VDB-342305 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.736063 (Submit #736063 | Tenda AX1803 V1.0.0.1 Stack-based Buffer Overflow)
vuldb.com/?submit.736064 (Submit #736064 | Tenda AX1803 V1.0.0.1 Stack-based Buffer Overflow (Duplicate))
vuldb.com/?submit.736065 (Submit #736065 | Tenda AX1803 V1.0.0.1 Stack-based Buffer Overflow (Duplicate))
vuldb.com/?submit.736066 (Submit #736066 | Tenda AX1803 V1.0.0.1 Stack-based Buffer Overflow (Duplicate))
vuldb.com/?submit.736067 (Submit #736067 | Tenda AX1803 V1.0.0.1 Stack-based Buffer Overflow (Duplicate))
river-brow-763.notion.site/...3a595a7aef80a78225db34317daa40
www.tenda.com.cn/