A HIGH-severity vulnerability identified as CVE-2026-3810 has been published on March 9, 2026 with a CVSS base score of 8.8. The vulnerability affects Tenda Fh1202 firmware. This security advisory provides a detailed breakdown of the vulnerability, its potential impact, weakness classification, and actionable steps to protect your systems.
Table of Contents
ToggleVulnerability Details
CVE ID: CVE-2026-3810
Severity: HIGH
CVSS Score: 8.8
Published: March 9, 2026
Affected Product: Tenda Fh1202 firmware
Weakness (CWE): CWE-119
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | Low |
| User Interaction | None |
| Confidentiality Impact | High |
| Integrity Impact | High |
| Availability Impact | High |
Technical Description
A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Potential Impact
If exploited, this high-severity vulnerability could allow an attacker to compromise sensitive data confidentiality, tamper with system integrity, cause a denial of service. Organizations running Tenda Fh1202 firmware should treat this as a priority remediation item.
Recommended Action
No official patch is available yet. Until one is released:
- Monitor the official NVD page and vendor channels for patch announcements.
- Restrict access to the affected system or service where possible.
- Apply network-level mitigations such as firewall rules or WAF policies.
- Enable logging and alerting for anomalous activity related to this vulnerability.
- Review your incident response plan in case of active exploitation.
References
- Exploit, Third Party Advisory
- Permissions Required, VDB Entry
- Third Party Advisory, VDB Entry
- Third Party Advisory, VDB Entry
- Product
Related Security Advisories
- [HIGH] CVE-2026-3169 — CVSS 8.8 (February 25, 2026) — HIGH / CVSS 8.8
- [HIGH] CVE-2025-14675 — CVSS 7.2 (March 7, 2026) — HIGH / CVSS 7.2
- [HIGH] CVE-2026-29062 — CVSS 8.7 (March 6, 2026) — HIGH / CVSS 8.7

![[HIGH] CVE-2026-0234 — CVSS 7.2 (April 13, 2026)](https://atlas-cybersecurity.com/wp-content/plugins/elementor/assets/images/placeholder.png)



