Metrics
Affected Vendors & Products
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda w3 Firmware
|
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:w3:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:w3_firmware:1.0.0.3\(2204\):*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda w3 Firmware
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda w3 |
|
| Vendors & Products |
Tenda
Tenda w3 |
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used. | |
| Title | Tenda W3 POST Parameter wifiSSIDget stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-03-12T06:32:09.542Z
Updated: 2026-03-12T14:23:03.456Z
Reserved: 2026-03-11T18:58:11.145Z
Link: CVE-2026-4007
Updated: 2026-03-12T14:22:59.460Z
Status : Analyzed
Published: 2026-03-12T07:16:18.583
Modified: 2026-04-02T20:07:11.523
Link: CVE-2026-4007
No data.