Submit #778320: Tenda W3 V1.0.0.4(3822)_EN Buffer Overflowinfo

TitleTenda W3 V1.0.0.4(3822)_EN Buffer Overflow
DescriptionA stack-based buffer overflow vulnerability exists in Tenda w3 V1.0.0.4(3822)_EN in the HTTP handler formexeCommand, exposed via /goform/exeCommand. The POST parameter cmdinput is copied into a fixed-size stack buffer without proper bounds checking. An attacker can provide an overly long cmdinput value to overwrite stack data, crash the management service, and potentially hijack control flow.
Source⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-v1.0.0.4(3822)_EN-formexeCommand-cmdinput-buffer-overflow
User
 Svigo (UID 95964)
Submission03/12/2026 04:11 (24 days ago)
Moderation03/27/2026 15:20 (15 days later)
StatusDuplicate
VulDB entry350409 [Tenda W3 1.0.0.3(2204) HTTP /goform/exeCommand formexeCommand cmdinput stack-based overflow]
Points0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!