Submeter #725498: Tenda M3 V1.0.0.13(4903) Stack-based Buffer Overflowinformação

TítuloTenda M3 V1.0.0.13(4903) Stack-based Buffer Overflow
DescriçãoThe formexeCommand handler in /bin/httpd is vulnerable to stack overflow due to the complete absence of user input sanitization and bounds checking on parameter cmdinput which can lead to corruption of data on the stack, hijacking of control flow, and DoS. The attack can be performed remotely. The vulnerability is in the strcpy() call with no bounds checking. Send a POST request to the /goform/exeCommand endpoint to trigger the buffer overflow
Fonte⚠️ https://github.com/dwBruijn/CVEs/blob/main/Tenda/execCommand.md
Utilizador
 dwbruijn (UID 93926)
Submissão28/12/2025 17h52 (há 3 meses)
Moderação29/12/2025 10h17 (16 hours later)
EstadoAceite
Entrada VulDB338643 [Tenda M3 1.0.0.13(4903) /goform/exeCommand cmdinput Excesso de tampão]
Pontos20

Interested in the pricing of exploits?

See the underground prices here!