CVE-2026-3971

A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument index/GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:i3_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:i3:-:*:*:*:*:*:*:*

History

02 Apr 2026, 20:09

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:o:tenda:i3_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:i3:-:*:*:*:*:*:*:*
First Time Tenda
Tenda i3
Tenda i3 Firmware
References () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-formwrlSSIDset-go-buffer-overflow - () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-formwrlSSIDset-go-buffer-overflow - Exploit, Third Party Advisory
References () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-formwrlSSIDset-index-buffer-overflow - () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-formwrlSSIDset-index-buffer-overflow - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.350406 - () https://vuldb.com/?ctiid.350406 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.350406 - () https://vuldb.com/?id.350406 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.768996 - () https://vuldb.com/?submit.768996 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.768997 - () https://vuldb.com/?submit.768997 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

12 Mar 2026, 21:07

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en Tenda i3 1.0.0.6(2204). Afectada por esta vulnerabilidad es la función formwrlSSIDset del archivo /goform/wifiSSIDset. La manipulación del argumento index/GO conduce a un desbordamiento de búfer basado en pila. La explotación remota del ataque es posible. El exploit ha sido divulgado al público y puede ser utilizado.

12 Mar 2026, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-12 01:15

Updated : 2026-04-02 20:09


NVD link : CVE-2026-3971

Mitre link : CVE-2026-3971

CVE.ORG link : CVE-2026-3971


JSON object : View

Products Affected

tenda

  • i3
  • i3_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write