Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3803: Stack-based Buffer Overflow in Tenda i3

0
High
VulnerabilityCVE-2026-3803cvecve-2026-3803
Published: Mon Mar 09 2026 (03/09/2026, 05:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: i3

Description

CVE-2026-3803 is a high-severity stack-based buffer overflow vulnerability in Tenda i3 version 1. 0. 0. 6(2204), specifically in the formWifiMacFilterGet function accessed via /goform/WifiMacFilterGet. The vulnerability arises from improper handling of the 'index' argument, allowing remote attackers to trigger a buffer overflow without authentication or user interaction. Exploitation can lead to complete compromise of the device, including remote code execution and system control. Although no known exploits are currently observed in the wild, a public exploit exists, increasing the risk of active attacks. The vulnerability affects network availability and device integrity, posing significant risks to organizations using Tenda i3 routers. Mitigation requires immediate patching or applying vendor-recommended workarounds, network segmentation, and monitoring for suspicious activity. Countries with widespread Tenda device usage and strategic reliance on such network infrastructure are at higher risk.

AI-Powered Analysis

AILast updated: 03/09/2026, 05:37:01 UTC

Technical Analysis

CVE-2026-3803 is a stack-based buffer overflow vulnerability identified in the Tenda i3 router firmware version 1.0.0.6(2204). The flaw exists in the function formWifiMacFilterGet, which is accessible via the /goform/WifiMacFilterGet endpoint. The vulnerability is triggered by manipulating the 'index' parameter, which is improperly validated, leading to a stack buffer overflow condition. This overflow can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation can result in arbitrary code execution on the device, allowing attackers to gain full control over the router. This can lead to interception or manipulation of network traffic, disruption of network services, or pivoting into internal networks. The CVSS 4.0 base score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges or user interaction required. Although no active exploitation has been reported, a public exploit is available, increasing the likelihood of future attacks. The vulnerability affects a specific firmware version of the Tenda i3 product line, commonly used in small office and home network environments. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

The impact of CVE-2026-3803 is significant for organizations using Tenda i3 routers, especially those running the vulnerable firmware version 1.0.0.6(2204). Exploitation can lead to full compromise of the router, enabling attackers to execute arbitrary code remotely. This can result in unauthorized access to internal networks, interception and manipulation of sensitive data, disruption of network availability, and potential lateral movement to other connected systems. For enterprises, this could mean exposure of confidential information, interruption of business operations, and increased risk of further compromise. In environments where Tenda i3 devices serve as critical network gateways, the vulnerability could be leveraged to launch broader attacks or establish persistent footholds. The ease of remote exploitation without authentication amplifies the threat, making it attractive for attackers targeting home users, small businesses, and possibly larger organizations relying on these devices. The availability of a public exploit increases the risk of widespread attacks, potentially leading to botnet recruitment or ransomware deployment. Overall, the vulnerability poses a high risk to network security, data confidentiality, and operational continuity.

Mitigation Recommendations

To mitigate CVE-2026-3803, organizations should first verify if their Tenda i3 devices are running the affected firmware version 1.0.0.6(2204). If so, they should immediately check for official patches or firmware updates from Tenda and apply them as soon as they become available. In the absence of an official patch, network administrators should restrict access to the management interface, especially blocking external internet access to the /goform/WifiMacFilterGet endpoint. Implementing network segmentation to isolate vulnerable devices from critical infrastructure can limit potential damage. Monitoring network traffic for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts early. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability or the public exploit can provide additional defense. Changing default credentials and disabling unnecessary remote management features reduces attack surface. For home users, replacing vulnerable devices with updated models or alternative vendors may be necessary if patches are not forthcoming. Regularly auditing device firmware versions and maintaining an inventory of network devices will improve preparedness against similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-08T12:39:43.402Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae59252904315ca3ba53b1

Added to database: 3/9/2026, 5:22:45 AM

Last enriched: 3/9/2026, 5:37:01 AM

Last updated: 3/9/2026, 7:14:27 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses