| Title | Tenda W3 V1.0.0.4(3822)_EN Buffer Overflow |
|---|
| Description | A stack-based buffer overflow vulnerability exists in Tenda w3 V1.0.0.4(3822)_EN in the function formWifiMacFilterGet at /goform/WifiMacFilterGet. The index POST parameter is copied into a stack buffer without length validation. A large index value can corrupt stack memory, causing denial of service and possibly enabling code execution in the HTTP handler. |
|---|
| Source | ⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-v1.0.0.4(3822)_EN-formWifiMacFilterGet-index-buffer-overflow |
|---|
| User | Svigo (UID 95964) |
|---|
| Submission | 03/12/2026 04:12 (24 days ago) |
|---|
| Moderation | 03/27/2026 15:20 (15 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 350410 [Tenda W3 1.0.0.3(2204) POST Parameter /goform/WifiMacFilterGet formWifiMacFilterGet wl_radio stack-based overflow] |
|---|
| Points | 0 |
|---|