Description
A flaw has been found in Tenda M3 1.0.0.13(4903). The affected element is the function formSetRemoteDhcpForAp of the file /goform/setDhcpAP. This manipulation of the argument startip/endip/leasetime/gateway/dns1/dns2 causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.
Problem types
Product status
Timeline
| 2025-12-29: | Advisory disclosed |
| 2025-12-29: | VulDB entry created |
| 2025-12-29: | VulDB entry last update |
Credits
dwbruijn (VulDB User)
References
vuldb.com/?id.338642 (VDB-338642 | Tenda M3 setDhcpAP formSetRemoteDhcpForAp stack-based overflow)
vuldb.com/?ctiid.338642 (VDB-338642 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.725497 (Submit #725497 | Tenda M3 V1.0.0.13(4903) Stack-based Buffer Overflow)
github.com/...ijn/CVEs/blob/main/Tenda/setRemoteDhcpForAp.md
www.tenda.com.cn/
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.