Soumettre #782999: Tenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflowinformation

TitreTenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflow
DescriptionA serious buffer overflow vulnerability exists in the setAdvPolicyData function of Tenda M3 V1.0.0.10 firmware, specifically in its subroutine sub_648D4. The vulnerability is caused by the following unsafe code logic: strncpy(dest, src, v16 - src); The copy length v16 - src is directly calculated from user-controlled input, while the program does not properly validate the actual size of the destination buffer dest. As a result, an attacker can craft malicious parameters to trigger a buffer overflow and cause denial of service (DoS) or other security impacts.
La source⚠️ https://github.com/Moxxkidd/CVE/issues/2
Utilisateur
 Doma (UID 96528)
Soumission19/03/2026 15:17 (il y a 17 jours)
Modérer04/04/2026 16:26 (16 days later)
StatutAccepté
Entrée VulDB355337 [Tenda M3 1.0.0.10 Destination /goform/setAdvPolicyData policyType buffer overflow]
Points20

Do you know our Splunk app?

Download it now for free!