| Titre | Tenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflow |
|---|
| Description | A serious buffer overflow vulnerability exists in the setAdvPolicyData function of Tenda M3 V1.0.0.10 firmware, specifically in its subroutine sub_648D4. The vulnerability is caused by the following unsafe code logic:
strncpy(dest, src, v16 - src);
The copy length v16 - src is directly calculated from user-controlled input, while the program does not properly validate the actual size of the destination buffer dest. As a result, an attacker can craft malicious parameters to trigger a buffer overflow and cause denial of service (DoS) or other security impacts. |
|---|
| La source | ⚠️ https://github.com/Moxxkidd/CVE/issues/2 |
|---|
| Utilisateur | Doma (UID 96528) |
|---|
| Soumission | 19/03/2026 15:17 (il y a 17 jours) |
|---|
| Modérer | 04/04/2026 16:26 (16 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 355337 [Tenda M3 1.0.0.10 Destination /goform/setAdvPolicyData policyType buffer overflow] |
|---|
| Points | 20 |
|---|