top of page
perceptive_background_267k.jpg

A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component POST Parame…

Published:

11 maart 2026 om 23:00:00

Alert date:

12 maart 2026 om 22:25:09

Source:

nvd.nist.gov

Click to open the original link from this advisory

Mobile & IoT, Network Infrastructure

A critical stack-based buffer overflow vulnerability (CVE-2026-3973) has been discovered in Tenda W3 router version 1.0.0.3(2204). The vulnerability affects the formSetAutoPing function in the /goform/setAutoPing endpoint of the POST Parameter Handler component. Attackers can exploit this vulnerability remotely by manipulating the ping1 or ping2 arguments to cause a stack-based buffer overflow. The exploit has been publicly disclosed and proof-of-concept code is available on GitHub. This vulnerability can be leveraged by remote attackers to potentially gain unauthorized access or execute arbitrary code on affected devices.

Technical details

Mitigation steps:

Affected products:

Tenda W3 1.0.0.3(2204)

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page