A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-setautoping-ping1-buffer-overflow | Exploit Third Party Advisory |
| https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-setautoping-ping2-buffer-overflow | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.349768 | Permissions Required VDB Entry |
| https://vuldb.com/?id.349768 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.768980 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.768982 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-09 04:16
Updated : 2026-03-09 16:14
NVD link : CVE-2026-3801
Mitre link : CVE-2026-3801
CVE.ORG link : CVE-2026-3801
JSON object : View
Products Affected
tenda
- i3
- i3_firmware
