top of page
perceptive_background_267k.jpg

A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing …

Published:

8 maart 2026 om 23:00:00

Alert date:

9 maart 2026 om 15:03:25

Source:

nvd.nist.gov

Click to open the original link from this advisory

Mobile & IoT, Network Infrastructure

A stack-based buffer overflow vulnerability was discovered in Tenda i3 router firmware version 1.0.0.6(2204). The vulnerability affects the formSetAutoPing function in the /goform/setAutoPing file. Remote attackers can exploit this flaw by manipulating the ping1/ping2 arguments to trigger a buffer overflow. The vulnerability can be exploited remotely without authentication. Public exploits are available, making this a high-priority security risk for affected devices. Organizations using Tenda i3 routers should immediately assess their exposure and apply security updates when available.

Technical details

Mitigation steps:

Affected products:

Tenda i3

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page