Description
A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.
Problem types
Product status
Timeline
| 2026-03-11: | Advisory disclosed |
| 2026-03-11: | VulDB entry created |
| 2026-03-11: | VulDB entry last update |
Credits
Svigo_o (VulDB User)
References
vuldb.com/?id.350531 (VDB-350531 | Tenda W3 POST Parameter wifiSSIDset stack-based overflow)
vuldb.com/?ctiid.350531 (VDB-350531 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.769182 (Submit #769182 | Tenda W3 V1.0.0.3(2204) Buffer Overflow)
vuldb.com/?submit.769183 (Submit #769183 | Tenda W3 V1.0.0.3(2204) Buffer Overflow (Duplicate))
github.com/.../tenda-w3-formwrlSSIDset-index-buffer-overflow
github.com/...ain/tenda-w3-formwrlSSIDset-go-buffer-overflow
www.tenda.com.cn/