| Title | Tenda W3 V1.0.0.4(3822)_EN Buffer Overflow |
|---|
| Description | A stack-based buffer overflow vulnerability exists in Tenda w3 V1.0.0.4(3822)_EN in formSetAutoPing at /goform/setAutoPing. The handler copies ping2 into a fixed-length stack buffer without bounds checking. A crafted request with an oversized ping2 value triggers stack corruption, resulting in a crash of the HTTP service and possible code execution. |
|---|
| Source | ⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-v1.0.0.4(3822)_EN-setautoping-ping2-buffer-overflow |
|---|
| User | Svigo (UID 95964) |
|---|
| Submission | 03/12/2026 04:10 (24 days ago) |
|---|
| Moderation | 03/27/2026 15:20 (15 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 350408 [Tenda W3 1.0.0.3(2204) POST Parameter /goform/setAutoPing formSetAutoPing ping1/ping2 stack-based overflow] |
|---|
| Points | 0 |
|---|