CVE-2026-4008

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to remotely take control of a Tenda W3 router by exploiting a flaw in how it processes certain data, potentially leading to a crash or unauthorized access. The attacker needs to send a specially crafted request to the router, making it relatively easy to exploit if the device is connected to the internet.

Technical Description

A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,842($1K-$5K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Mar 12, 2026

27 days ago

Last Modified

Mar 12, 2026

26 days ago