CVE-2026-3973

A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component POST Parameter Handler. This manipulation of the argument ping1/ping2 causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*

History

02 Apr 2026, 20:07

Type Values Removed Values Added
References () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setautoping-ping1-buffer-overflow - () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setautoping-ping1-buffer-overflow - Exploit, Third Party Advisory
References () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setautoping-ping2-buffer-overflow - () https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setautoping-ping2-buffer-overflow - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.350408 - () https://vuldb.com/?ctiid.350408 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.350408 - () https://vuldb.com/?id.350408 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.769173 - () https://vuldb.com/?submit.769173 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.769176 - () https://vuldb.com/?submit.769176 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
First Time Tenda
Tenda w3
Tenda w3 Firmware
CPE cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:*
CWE CWE-787

12 Mar 2026, 21:07

Type Values Removed Values Added
Summary
  • (es) Se determinó una vulnerabilidad en Tenda W3 1.0.0.3(2204). Esto afecta a la función formSetAutoPing del archivo /goform/setAutoPing del componente Gestor de Parámetros POST. Esta manipulación del argumento ping1/ping2 provoca un desbordamiento de búfer basado en pila. El ataque puede llevarse a cabo de forma remota. El exploit ha sido divulgado públicamente y puede ser utilizado.

12 Mar 2026, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-12 02:15

Updated : 2026-04-02 20:07


NVD link : CVE-2026-3973

Mitre link : CVE-2026-3973

CVE.ORG link : CVE-2026-3973


JSON object : View

Products Affected

tenda

  • w3
  • w3_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write