CVE-2026-3810: Stack-based Buffer Overflow in Tenda FH1202
A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2026-3810 identifies a stack-based buffer overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The vulnerability resides in the fromDhcpListClient function, specifically in the handling of the 'page' argument passed to the /goform/DhcpListClient endpoint. Improper input validation or bounds checking allows an attacker to overflow the stack buffer, which can lead to overwriting control data such as return addresses. This flaw is exploitable remotely over the network without requiring authentication or user interaction, making it highly dangerous. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges on the device, potentially leading to full device compromise. The vulnerability was publicly disclosed on March 9, 2026, with exploit code available, although no active exploitation has been reported yet. The CVSS 4.0 base score of 8.7 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. The affected product, Tenda FH1202, is a consumer-grade router commonly deployed in residential and small business environments, particularly in Asia and emerging markets. The lack of an official patch or update link in the disclosure suggests that mitigation may require vendor intervention or temporary workarounds. Due to the critical nature of the flaw and the potential for remote code execution, organizations should treat this vulnerability with high priority.
Potential Impact
The impact of CVE-2026-3810 is significant for organizations and individuals using the Tenda FH1202 router version 1.2.0.14(408). Exploitation can lead to arbitrary code execution on the device, allowing attackers to gain full control over the router. This can result in interception or manipulation of network traffic, disruption of network availability, and the establishment of persistent backdoors for further attacks. Compromised routers can be leveraged as entry points into internal networks, facilitating lateral movement and data exfiltration. The vulnerability's remote exploitability without authentication increases the attack surface, making large-scale automated attacks feasible once exploit code is widely adopted. This poses a particular risk to small businesses and home users who may lack robust network defenses or timely patch management. Additionally, compromised routers can be conscripted into botnets for distributed denial-of-service (DDoS) attacks, amplifying the threat to broader internet infrastructure. The absence of a patch at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts to reduce exposure.
Mitigation Recommendations
To mitigate CVE-2026-3810 effectively, organizations should first check for any firmware updates or patches released by Tenda addressing this vulnerability and apply them promptly. In the absence of an official patch, network administrators should disable remote management interfaces on the affected routers to prevent external exploitation. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data. Employ firewall rules to restrict access to the /goform/DhcpListClient endpoint and monitor network traffic for unusual requests targeting this URI. Use intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of this specific buffer overflow. Regularly audit router configurations and logs for signs of compromise or anomalous behavior. Consider replacing affected devices with models from vendors with a stronger security track record if patching is not feasible. Educate users about the risks of using outdated firmware and the importance of timely updates. Finally, maintain backups of router configurations to facilitate rapid recovery in case of compromise.
Affected Countries
China, India, Indonesia, Vietnam, Thailand, Malaysia, Philippines, Brazil, Russia, South Africa
CVE-2026-3810: Stack-based Buffer Overflow in Tenda FH1202
Description
A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3810 identifies a stack-based buffer overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The vulnerability resides in the fromDhcpListClient function, specifically in the handling of the 'page' argument passed to the /goform/DhcpListClient endpoint. Improper input validation or bounds checking allows an attacker to overflow the stack buffer, which can lead to overwriting control data such as return addresses. This flaw is exploitable remotely over the network without requiring authentication or user interaction, making it highly dangerous. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges on the device, potentially leading to full device compromise. The vulnerability was publicly disclosed on March 9, 2026, with exploit code available, although no active exploitation has been reported yet. The CVSS 4.0 base score of 8.7 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. The affected product, Tenda FH1202, is a consumer-grade router commonly deployed in residential and small business environments, particularly in Asia and emerging markets. The lack of an official patch or update link in the disclosure suggests that mitigation may require vendor intervention or temporary workarounds. Due to the critical nature of the flaw and the potential for remote code execution, organizations should treat this vulnerability with high priority.
Potential Impact
The impact of CVE-2026-3810 is significant for organizations and individuals using the Tenda FH1202 router version 1.2.0.14(408). Exploitation can lead to arbitrary code execution on the device, allowing attackers to gain full control over the router. This can result in interception or manipulation of network traffic, disruption of network availability, and the establishment of persistent backdoors for further attacks. Compromised routers can be leveraged as entry points into internal networks, facilitating lateral movement and data exfiltration. The vulnerability's remote exploitability without authentication increases the attack surface, making large-scale automated attacks feasible once exploit code is widely adopted. This poses a particular risk to small businesses and home users who may lack robust network defenses or timely patch management. Additionally, compromised routers can be conscripted into botnets for distributed denial-of-service (DDoS) attacks, amplifying the threat to broader internet infrastructure. The absence of a patch at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts to reduce exposure.
Mitigation Recommendations
To mitigate CVE-2026-3810 effectively, organizations should first check for any firmware updates or patches released by Tenda addressing this vulnerability and apply them promptly. In the absence of an official patch, network administrators should disable remote management interfaces on the affected routers to prevent external exploitation. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data. Employ firewall rules to restrict access to the /goform/DhcpListClient endpoint and monitor network traffic for unusual requests targeting this URI. Use intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of this specific buffer overflow. Regularly audit router configurations and logs for signs of compromise or anomalous behavior. Consider replacing affected devices with models from vendors with a stronger security track record if patching is not feasible. Educate users about the risks of using outdated firmware and the importance of timely updates. Finally, maintain backups of router configurations to facilitate rapid recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-08T16:22:52.352Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ae7fd12904315ca3e0a268
Added to database: 3/9/2026, 8:07:45 AM
Last enriched: 3/16/2026, 9:33:41 AM
Last updated: 4/23/2026, 7:24:10 AM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.