Отправить #725494: Tenda M3 V1.0.0.13(4903) Stack-based Buffer OverflowИнформация

НазваниеTenda M3 V1.0.0.13(4903) Stack-based Buffer Overflow
ОписаниеThe formSetAdPushInfo handler in /bin/httpd is vulnerable to multiple stack overflows due to the absence of user input sanitization and bounds checking on parameters mac and terminal which can lead to corruption of data on the stack, hijacking of control flow, and DoS. The attack can be performed remotely. The vulnerability is in the memcpy() calls with no bounds checking. Send a POST request to the /goform/setAdPushInfo endpoint to trigger the stack overflow
Источник⚠️ https://github.com/dwBruijn/CVEs/blob/main/Tenda/setAdPushInfo.md
Пользователь
 dwbruijn (UID 93926)
Представление28.12.2025 17:36 (4 месяцы назад)
Модерация29.12.2025 09:01 (15 hours later)
Статуспринято
Запись VulDB338628 [Tenda M3 1.0.0.13(4903) /goform/setAdPushInfo formSetAdPushInfo mac/terminal повреждение памяти]
Баллы20

Want to know what is going to be exploited?

We predict KEV entries!