Description
A vulnerability was identified in Tenda O3 1.0.0.10(2478). Affected by this vulnerability is the function SetValue/GetValue of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Eine Schwachstelle wurde in Tenda O3 1.0.0.10(2478) gefunden. Es geht dabei um die Funktion SetValue/GetValue der Datei /goform/AdvSetLanip. Die Veränderung des Parameters lanIp resultiert in stack-based buffer overflow. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
Problem types
Product status
Timeline
| 2025-10-25: | Advisory disclosed |
| 2025-10-25: | VulDB entry created |
| 2025-10-25: | VulDB entry last update |
Credits
wxhwxhwxh_mie (VulDB User)
References
vuldb.com/?id.329880 (VDB-329880 | Tenda O3 AdvSetLanip GetValue stack-based overflow)
vuldb.com/?ctiid.329880 (VDB-329880 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.673264 (Submit #673264 | Tenda O3 V1.0.0.10(2478) Buffer Overflow)
github.com/...lnerable/blob/main/Tenda/O3v2.0/AdvSetLanip.md
www.tenda.com.cn/