Description


A flaw has been found in Tenda M3 1.0.0.13(4903). The affected element is the function formSetRemoteDhcpForAp of the file /goform/setDhcpAP. This manipulation of the argument startip/endip/leasetime/gateway/dns1/dns2 causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.

References



https://vuldb.com/?ctiid.338642

Permissions RequiredVDB Entry

https://vuldb.com/?id.338642

Third Party AdvisoryVDB Entry

https://vuldb.com/?submit.725497

Third Party AdvisoryVDB Entry

Weaknesses



CWE-119CWE-121

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 · High

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2025-12-30T14:15:43.857Z

3 weeks ago

Last modified

2026-01-02T20:18:09.393Z

2 weeks ago