Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p36g-m864-jrh5

Опубликовано: 30 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A weakness has been identified in Tenda M3 1.0.0.13(4903). Impacted is the function formSetRemoteInternetLanInfo of the file /goform/setInternetLanInfo. This manipulation of the argument portIp/portMask/portGateWay/portDns/portSecDns causes heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

A weakness has been identified in Tenda M3 1.0.0.13(4903). Impacted is the function formSetRemoteInternetLanInfo of the file /goform/setInternetLanInfo. This manipulation of the argument portIp/portMask/portGateWay/portDns/portSecDns causes heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

EPSS

Процентиль: 26%
0.00092
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 месяца назад

A weakness has been identified in Tenda M3 1.0.0.13(4903). Impacted is the function formSetRemoteInternetLanInfo of the file /goform/setInternetLanInfo. This manipulation of the argument portIp/portMask/portGateWay/portDns/portSecDns causes heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 8.8
fstec
около 1 месяца назад

Уязвимость функции formSetRemoteInternetLanInfo() (/goform/setInternetLanInfo) микропрограммного обеспечения маршрутизаторов Tenda M3, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 26%
0.00092
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119