| 标题 | Tenda Tenda M3 Access Controller(M3) V1.0.0.10 Buffer Overflow |
|---|
| 描述 | A serious buffer overflow vulnerability exists in the setAdvPolicyData function of Tenda M3 V1.0.0.10 firmware, specifically in its subroutine sub_648D4. The vulnerability is caused by the following unsafe code logic:
strncpy(dest, src, v16 - src);
The copy length v16 - src is directly calculated from user-controlled input, while the program does not properly validate the actual size of the destination buffer dest. As a result, an attacker can craft malicious parameters to trigger a buffer overflow and cause denial of service (DoS) or other security impacts. |
|---|
| 来源 | ⚠️ https://github.com/Moxxkidd/CVE/issues/2 |
|---|
| 用户 | Doma (UID 96528) |
|---|
| 提交 | 2026-03-19 15時17分 (18 日前) |
|---|
| 管理 | 2026-04-04 16時26分 (16 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 355337 [Tenda M3 1.0.0.10 Destination /goform/setAdvPolicyData policyType 内存损坏] |
|---|
| 积分 | 20 |
|---|