CVE-2026-3972

A vulnerability was found in Tenda W3 1.0.0.3(2204). Affected by this issue is the function formSetCfm of the file /goform/setcfm of the component HTTP Handler. The manipulation of the argument funcpara1 results in stack-based buffer overflow. The attack can only be performed from the local network. The exploit has been made public and could be used.
References
Link Resource
https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setcfm-funcpara1-buffer-overflow Exploit Third Party Advisory
https://vuldb.com/?ctiid.350407 Permissions Required VDB Entry
https://vuldb.com/?id.350407 Third Party Advisory VDB Entry
https://vuldb.com/?submit.769172 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*

History

02 Apr 2026, 20:08

Type Values Removed Values Added
First Time Tenda
Tenda w3
Tenda w3 Firmware
CPE cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
References () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setcfm-funcpara1-buffer-overflow - () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setcfm-funcpara1-buffer-overflow - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.350407 - () https://vuldb.com/?ctiid.350407 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.350407 - () https://vuldb.com/?id.350407 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.769172 - () https://vuldb.com/?submit.769172 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
CWE CWE-787

12 Mar 2026, 21:07

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Tenda W3 1.0.0.3(2204). Afectada por este problema es la función formSetCfm del archivo /goform/setcfm del componente Gestor HTTP. La manipulación del argumento funcpara1 resulta en desbordamiento de búfer basado en pila. El ataque solo puede realizarse desde la red local. El exploit ha sido hecho público y podría ser usado.

12 Mar 2026, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-12 02:15

Updated : 2026-04-29 01:00


NVD link : CVE-2026-3972

Mitre link : CVE-2026-3972

CVE.ORG link : CVE-2026-3972


JSON object : View

Products Affected

tenda

  • w3
  • w3_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write