Description
A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Problem types
Product status
Timeline
| 2026-03-11: | Advisory disclosed |
| 2026-03-11: | VulDB entry created |
| 2026-03-11: | VulDB entry last update |
Credits
Svigo_o (VulDB User)
References
vuldb.com/?id.350411 (VDB-350411 | Tenda W3 POST Parameter WifiMacFilterSet formWifiMacFilterSet stack-based overflow)
vuldb.com/?ctiid.350411 (VDB-350411 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.769179 (Submit #769179 | Tenda W3 V1.0.0.3(2204) Buffer Overflow)
vuldb.com/?submit.769180 (Submit #769180 | Tenda W3 V1.0.0.3(2204) Buffer Overflow (Duplicate))
github.com/...-w3-formWifiMacFilterSet-index-buffer-overflow
github.com/...nda-w3-formWifiMacFilterSet-go-buffer-overflow
www.tenda.com.cn/