


Perceptive Security
SOC/SIEM Consultancy

A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter …
Published:
11 maart 2026 om 23:00:00
Alert date:
12 maart 2026 om 08:02:45
Source:
nvd.nist.gov
Mobile & IoT, Network Infrastructure
A stack-based buffer overflow vulnerability (CVE-2026-4007) was discovered in Tenda W3 router version 1.0.0.3(2204). The vulnerability exists in the /goform/wifiSSIDget file within the POST Parameter Handler component. Attackers can exploit this by manipulating the 'index' argument, leading to a stack-based buffer overflow. The vulnerability can be exploited remotely, and a public exploit is now available. This affects the router's WiFi SSID functionality and poses a significant security risk to affected devices.
Technical details
Mitigation steps:
Affected products:
Tenda W3
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-4007
https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-formwrlSSIDget-index-buffer-overflow
https://vuldb.com/?ctiid.350530
https://vuldb.com/?id.350530
https://vuldb.com/?submit.769181
https://www.tenda.com.cn/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
