Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3804: Stack-based Buffer Overflow in Tenda i3

0
High
VulnerabilityCVE-2026-3804cvecve-2026-3804
Published: Mon Mar 09 2026 (03/09/2026, 05:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: i3

Description

CVE-2026-3804 is a high-severity stack-based buffer overflow vulnerability in the Tenda i3 router firmware version 1. 0. 0. 6(2204). The flaw exists in the formWifiMacFilterSet function within the /goform/WifiMacFilterSet endpoint, where improper handling of the 'index' argument allows remote attackers to overflow the stack. This vulnerability can be exploited remotely without user interaction or authentication, potentially leading to arbitrary code execution with elevated privileges. Although no public exploits are currently observed in the wild, a proof-of-concept exploit has been publicly released, increasing the risk of active exploitation. The vulnerability impacts confidentiality, integrity, and availability of affected devices. Organizations using Tenda i3 routers should prioritize patching or mitigating this issue to prevent compromise. Countries with significant deployment of Tenda networking equipment, especially in Asia and parts of Europe, are at higher risk.

AI-Powered Analysis

AILast updated: 03/09/2026, 06:07:11 UTC

Technical Analysis

CVE-2026-3804 identifies a stack-based buffer overflow vulnerability in the Tenda i3 router firmware version 1.0.0.6(2204). The vulnerability resides in the formWifiMacFilterSet function, which processes requests to the /goform/WifiMacFilterSet endpoint. Specifically, the 'index' parameter is improperly validated or sanitized, allowing an attacker to supply crafted input that overflows the stack buffer. This overflow can corrupt the stack frame, potentially overwriting the return address or other control data, enabling remote code execution or denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 score of 8.7 reflects its high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. While no confirmed active exploitation has been reported, the public release of an exploit increases the likelihood of attacks. The affected product, Tenda i3, is a consumer-grade router commonly used in home and small office environments, which may be targeted to gain network access or pivot into internal networks. No official patches or mitigation links are currently provided, emphasizing the need for immediate defensive measures.

Potential Impact

The exploitation of CVE-2026-3804 can lead to full compromise of affected Tenda i3 routers. Attackers can execute arbitrary code remotely, potentially gaining control over the device's firmware and network traffic. This can result in interception or manipulation of sensitive data, disruption of network services, or use of the compromised router as a foothold for further attacks within the victim's network. The vulnerability threatens confidentiality by exposing network data, integrity by allowing unauthorized changes to device configuration or traffic, and availability by causing crashes or denial of service. Given the router's role as a network gateway, successful exploitation can have cascading effects on connected devices and organizational security. The ease of remote exploitation without credentials or user interaction significantly raises the risk profile. Organizations relying on Tenda i3 routers, especially in environments with sensitive data or critical infrastructure, face substantial operational and security risks if unmitigated.

Mitigation Recommendations

1. Immediate mitigation should focus on isolating affected Tenda i3 routers from untrusted networks, especially the internet, to reduce exposure. 2. Network administrators should implement strict firewall rules to block access to the /goform/WifiMacFilterSet endpoint or restrict management interfaces to trusted IP addresses only. 3. Monitor network traffic for unusual requests targeting the vulnerable endpoint and enable intrusion detection/prevention systems (IDS/IPS) signatures related to this vulnerability once available. 4. If possible, disable remote management features on the router to prevent external exploitation. 5. Regularly check for firmware updates or security advisories from Tenda and apply patches promptly once released. 6. Consider replacing affected devices with models from vendors with timely security support if patches are delayed. 7. Conduct network segmentation to limit the impact of compromised routers and protect critical assets. 8. Educate users and administrators about the risks and signs of compromise related to this vulnerability. These steps go beyond generic advice by focusing on access control, monitoring, and network architecture adjustments tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-08T12:39:46.177Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae602a2904315ca3bfed68

Added to database: 3/9/2026, 5:52:42 AM

Last enriched: 3/9/2026, 6:07:11 AM

Last updated: 3/9/2026, 8:11:51 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses