Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
Tenda i3 Router Allows Remote Code Execution Through Malformed Input
CVE-2026-3801
Summary
A security flaw in the Tenda i3 router allows an attacker to execute malicious code with remote access. This can happen when the router receives a specially crafted input. Update your router's software to the latest version to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| tenda | i3_firmware | 1.0.0.6\(2204\) | – |
Original title
A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/...
Original description
A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-setautoping-ping1-buffer...
- https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-setautoping-ping2-buffer...
- https://vuldb.com/?ctiid.349768
- https://vuldb.com/?id.349768
- https://vuldb.com/?submit.768980
- https://vuldb.com/?submit.768982
- https://www.tenda.com.cn/
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026