


Perceptive Security
SOC/SIEM Consultancy

A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing …
Published:
8 maart 2026 om 23:00:00
Alert date:
9 maart 2026 om 15:03:25
Source:
nvd.nist.gov
Mobile & IoT, Network Infrastructure
A stack-based buffer overflow vulnerability was discovered in Tenda i3 router firmware version 1.0.0.6(2204). The vulnerability affects the formSetAutoPing function in the /goform/setAutoPing file. Remote attackers can exploit this flaw by manipulating the ping1/ping2 arguments to trigger a buffer overflow. The vulnerability can be exploited remotely without authentication. Public exploits are available, making this a high-priority security risk for affected devices. Organizations using Tenda i3 routers should immediately assess their exposure and apply security updates when available.
Technical details
Mitigation steps:
Affected products:
Tenda i3
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-3801
https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-setautoping-ping1-buffer-overflow
https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-setautoping-ping2-buffer-overflow
https://vuldb.com/?ctiid.349768
https://vuldb.com/?id.349768
https://vuldb.com/?submit.768980
https://vuldb.com/?submit.768982
https://www.tenda.com.cn/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
