Description
A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Problem types
Product status
Timeline
| 2026-03-11: | Advisory disclosed |
| 2026-03-11: | VulDB entry created |
| 2026-03-11: | VulDB entry last update |
Credits
Svigo_o (VulDB User)
References
vuldb.com/?id.350530 (VDB-350530 | Tenda W3 POST Parameter wifiSSIDget stack-based overflow)
vuldb.com/?ctiid.350530 (VDB-350530 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.769181 (Submit #769181 | Tenda W3 V1.0.0.3(2204) Buffer Overflow)
github.com/.../tenda-w3-formwrlSSIDget-index-buffer-overflow
www.tenda.com.cn/