Description
A flaw has been found in Tenda M3 1.0.0.13(4903). The affected element is the function formSetRemoteDhcpForAp of the file /goform/setDhcpAP. This manipulation of the argument startip/endip/leasetime/gateway/dns1/dns2 causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.
References
https://github.com/dwBruijn/CVEs/blob/main/Tenda/setRemoteDhcpForAp.md
ExploitThird Party Advisory
https://vuldb.com/?ctiid.338642
Permissions RequiredVDB Entry
Third Party AdvisoryVDB Entry
https://vuldb.com/?submit.725497
Third Party AdvisoryVDB Entry
Product
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2025-12-30T14:15:43.857Z
3 weeks agoLast modified
2026-01-02T20:18:09.393Z
2 weeks ago