| Title | Tenda i3 V1.0.0.7(3856) Buffer Overflow |
|---|
| Description | A stack-based buffer overflow vulnerability exists in Tenda i3 V1.0.0.7(3856) in the formwrlSSIDget handler exposed by /goform/wifiSSIDget. The POST parameter index is copied into a fixed-size stack buffer without proper bounds checking. An attacker can exploit this flaw by sending an excessively long index value, causing stack memory corruption, denial of service, and potentially arbitrary code execution in the HTTP service. The issue is reproducible using a crafted POST request to the wireless SSID query endpoint. |
|---|
| Source | ⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-v1.0.0.7(3856)-formwrlSSIDget-index-buffer-overflow |
|---|
| User | Fan95 (UID 95969) |
|---|
| Submission | 03/12/2026 03:43 (17 days ago) |
|---|
| Moderation | 03/27/2026 13:49 (15 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 350405 [Tenda i3 1.0.0.6(2204) /goform/wifiSSIDget formwrlSSIDget index stack-based overflow] |
|---|
| Points | 0 |
|---|