


Perceptive Security
SOC/SIEM Consultancy

A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component POST Parameā¦
Published:
11 maart 2026 om 23:00:00
Alert date:
12 maart 2026 om 22:25:09
Source:
nvd.nist.gov
Mobile & IoT, Network Infrastructure
A critical stack-based buffer overflow vulnerability (CVE-2026-3973) has been discovered in Tenda W3 router version 1.0.0.3(2204). The vulnerability affects the formSetAutoPing function in the /goform/setAutoPing endpoint of the POST Parameter Handler component. Attackers can exploit this vulnerability remotely by manipulating the ping1 or ping2 arguments to cause a stack-based buffer overflow. The exploit has been publicly disclosed and proof-of-concept code is available on GitHub. This vulnerability can be leveraged by remote attackers to potentially gain unauthorized access or execute arbitrary code on affected devices.
Technical details
Mitigation steps:
Affected products:
Tenda W3 1.0.0.3(2204)
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-3973
https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setautoping-ping1-buffer-overflow
https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setautoping-ping2-buffer-overflow
https://vuldb.com/?ctiid.350408
https://vuldb.com/?id.350408
https://vuldb.com/?submit.769173
https://vuldb.com/?submit.769176
https://www.tenda.com.cn/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
