Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 30 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:i12_firmware:1.0.0.11\(3862\):*:*:*:*:*:*:* |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda i12
|
|
| Vendors & Products |
Tenda i12
|
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. | |
| Title | Tenda i12 Parameter wifiSSIDset formwrlSSIDset stack-based overflow | |
| First Time appeared |
Tenda
Tenda i12 Firmware |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:o:tenda:i12_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda i12 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-06T18:21:17.706Z
Reserved: 2026-04-05T15:24:57.517Z
Link: CVE-2026-5609
Updated: 2026-04-06T18:21:11.786Z
Status : Analyzed
Published: 2026-04-06T02:16:00.670
Modified: 2026-04-30T13:39:50.703
Link: CVE-2026-5609
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:47:37Z