提交 #782999: Tenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflow信息

标题Tenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflow
描述A serious buffer overflow vulnerability exists in the setAdvPolicyData function of Tenda M3 V1.0.0.10 firmware, specifically in its subroutine sub_648D4. The vulnerability is caused by the following unsafe code logic: strncpy(dest, src, v16 - src); The copy length v16 - src is directly calculated from user-controlled input, while the program does not properly validate the actual size of the destination buffer dest. As a result, an attacker can craft malicious parameters to trigger a buffer overflow and cause denial of service (DoS) or other security impacts.
来源⚠️ https://github.com/Moxxkidd/CVE/issues/2
用户
 Doma (UID 96528)
提交2026-03-19 15時17分 (18 日前)
管理2026-04-04 16時26分 (16 days later)
状态已接受
VulDB条目355337 [Tenda M3 1.0.0.10 Destination /goform/setAdvPolicyData policyType 内存损坏]
积分20

Interested in the pricing of exploits?

See the underground prices here!