Submit #782999: Tenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflowinfo

TitleTenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflow
DescriptionA serious buffer overflow vulnerability exists in the setAdvPolicyData function of Tenda M3 V1.0.0.10 firmware, specifically in its subroutine sub_648D4. The vulnerability is caused by the following unsafe code logic: strncpy(dest, src, v16 - src); The copy length v16 - src is directly calculated from user-controlled input, while the program does not properly validate the actual size of the destination buffer dest. As a result, an attacker can craft malicious parameters to trigger a buffer overflow and cause denial of service (DoS) or other security impacts.
Source⚠️ https://github.com/Moxxkidd/CVE/issues/2
User
 Doma (UID 96528)
Submission03/19/2026 15:17 (18 days ago)
Moderation04/04/2026 16:26 (16 days later)
StatusAccepted
VulDB entry355337 [Tenda M3 1.0.0.10 Destination /goform/setAdvPolicyData policyType buffer overflow]
Points20

Want to know what is going to be exploited?

We predict KEV entries!