| Title | Tenda W3 V1.0.0.4(3822)_EN Buffer Overflow |
|---|
| Description | A stack-based buffer overflow vulnerability exists in Tenda w3 V1.0.0.4(3822)_EN in the HTTP handler formexeCommand, exposed via /goform/exeCommand. The POST parameter cmdinput is copied into a fixed-size stack buffer without proper bounds checking. An attacker can provide an overly long cmdinput value to overwrite stack data, crash the management service, and potentially hijack control flow. |
|---|
| Source | ⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-v1.0.0.4(3822)_EN-formexeCommand-cmdinput-buffer-overflow |
|---|
| User | Svigo (UID 95964) |
|---|
| Submission | 03/12/2026 04:11 (24 days ago) |
|---|
| Moderation | 03/27/2026 15:20 (15 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 350409 [Tenda W3 1.0.0.3(2204) HTTP /goform/exeCommand formexeCommand cmdinput stack-based overflow] |
|---|
| Points | 0 |
|---|