| Название | Tenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflow |
|---|
| Описание | A serious buffer overflow vulnerability exists in the setAdvPolicyData function of Tenda M3 V1.0.0.10 firmware, specifically in its subroutine sub_648D4. The vulnerability is caused by the following unsafe code logic:
strncpy(dest, src, v16 - src);
The copy length v16 - src is directly calculated from user-controlled input, while the program does not properly validate the actual size of the destination buffer dest. As a result, an attacker can craft malicious parameters to trigger a buffer overflow and cause denial of service (DoS) or other security impacts. |
|---|
| Источник | ⚠️ https://github.com/Moxxkidd/CVE/issues/2 |
|---|
| Пользователь | Doma (UID 96528) |
|---|
| Представление | 19.03.2026 15:17 (18 дни назад) |
|---|
| Модерация | 04.04.2026 16:26 (16 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 355337 [Tenda M3 1.0.0.10 Destination /goform/setAdvPolicyData policyType повреждение памяти] |
|---|
| Баллы | 20 |
|---|