CVE-2026-3808
Published: 09 March 2026
Description
A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is…
more
now public and may be used.
Mitigating Controls (NIST 800-53 r5)AI
Timely remediation through firmware patching directly eliminates the stack-based buffer overflow vulnerability in the formWebTypeLibrary function.
Validating the webSiteId argument ensures proper bounds checking and prevents the stack-based buffer overflow from malformed remote inputs.
Memory protection safeguards like stack canaries and address space layout randomization mitigate exploitation of the stack-based buffer overflow even if input validation fails.
Security SummaryAI
CVE-2026-3808 is a stack-based buffer overflow vulnerability in the Tenda FH1202 router running firmware version 1.2.0.14(408). The issue resides in the formWebTypeLibrary function within the /goform/webtypelibrary file, where manipulation of the webSiteId argument triggers the overflow. This flaw, associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow), has a CVSS v3.1 base score of 8.8, reflecting its high severity.
The vulnerability can be exploited remotely over the network with low complexity and no user interaction required, but it necessitates low privileges (PR:L), such as those of an authenticated user. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), potentially enabling arbitrary code execution on the affected device.
References include a public exploit on GitHub at https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-fh1202-webtypelibrary-websiteid-buffer-overflow, along with VulDB entries (https://vuldb.com/?ctiid.349774, https://vuldb.com/?id.349774, https://vuldb.com/?submit.769023) detailing the issue. The vendor's site (https://www.tenda.com.cn/) is listed, though specific patch or mitigation guidance is not detailed in the provided information.
The exploit is publicly available and may be used, increasing the risk for unpatched Tenda FH1202 devices.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remotely exploitable buffer overflow in a router's web interface (/goform/webtypelibrary), enabling arbitrary code execution via public-facing application exploitation (T1190) or remote services exploitation (T1210), with public exploit available.