Description
A security flaw has been discovered in Tenda W3 1.0.0.3(2204). This issue affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component POST Parameter Handler. Performing a manipulation of the argument wl_radio results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Problem types
Product status
Timeline
| 2026-03-11: | Advisory disclosed |
| 2026-03-11: | VulDB entry created |
| 2026-03-11: | VulDB entry last update |
Credits
Svigo_o (VulDB User)
References
vuldb.com/?id.350410 (VDB-350410 | Tenda W3 POST Parameter WifiMacFilterGet formWifiMacFilterGet stack-based overflow)
vuldb.com/?ctiid.350410 (VDB-350410 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.769178 (Submit #769178 | Tenda W3 V1.0.0.3(2204) Buffer Overflow)
github.com/...-w3-formWifiMacFilterGet-index-buffer-overflow
www.tenda.com.cn/