| Title | Tenda i3 V1.0.0.7(3856) Buffer Overflow |
|---|
| Description | A stack-based buffer overflow vulnerability exists in Tenda i3 V1.0.0.7(3856) in the function formwrlSSIDset, reachable through /goform/wifiSSIDset. The vulnerable POST parameter is GO. Because the handler copies this parameter into a stack-based buffer without proper length checks, an attacker can supply an oversized value to corrupt stack memory. Successful exploitation results in a service crash and may provide a path to arbitrary code execution. This issue is separately triggerable through the GO parameter of the same endpoint. |
|---|
| Source | ⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-v1.0.0.7(3856)-formwrlSSIDset-go-buffer-overflow |
|---|
| User | Fan95 (UID 95969) |
|---|
| Submission | 03/12/2026 03:44 (17 days ago) |
|---|
| Moderation | 03/27/2026 13:50 (15 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 350406 [Tenda i3 1.0.0.6(2204) /goform/wifiSSIDset formwrlSSIDset index/GO stack-based overflow] |
|---|
| Points | 0 |
|---|