Description


A security flaw has been discovered in Tenda M3 1.0.0.13(4903). This issue affects the function formSetAdInfoDetails of the file /goform/setAdInfoDetail. The manipulation of the argument adName/smsPassword/smsAccount/weixinAccount/weixinName/smsSignature/adRedirectUrl/adCopyRight/smsContent/adItemUID results in heap-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

References



https://vuldb.com/?ctiid.338629

Permissions RequiredVDB Entry

https://vuldb.com/?id.338629

Third Party AdvisoryVDB Entry

https://vuldb.com/?submit.725495

Third Party AdvisoryVDB Entry

Weaknesses



CWE-119CWE-122

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 · High

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2025-12-30T07:15:43.300Z

3 weeks ago

Last modified

2026-01-02T20:17:41.667Z

2 weeks ago