Логотип exploitDog
bind:CVE-2025-15234
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-15234

Количество 3

Количество 3

nvd логотип

CVE-2025-15234

около 1 месяца назад

A weakness has been identified in Tenda M3 1.0.0.13(4903). Impacted is the function formSetRemoteInternetLanInfo of the file /goform/setInternetLanInfo. This manipulation of the argument portIp/portMask/portGateWay/portDns/portSecDns causes heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-p36g-m864-jrh5

около 1 месяца назад

A weakness has been identified in Tenda M3 1.0.0.13(4903). Impacted is the function formSetRemoteInternetLanInfo of the file /goform/setInternetLanInfo. This manipulation of the argument portIp/portMask/portGateWay/portDns/portSecDns causes heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2026-00326

около 1 месяца назад

Уязвимость функции formSetRemoteInternetLanInfo() (/goform/setInternetLanInfo) микропрограммного обеспечения маршрутизаторов Tenda M3, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-15234

A weakness has been identified in Tenda M3 1.0.0.13(4903). Impacted is the function formSetRemoteInternetLanInfo of the file /goform/setInternetLanInfo. This manipulation of the argument portIp/portMask/portGateWay/portDns/portSecDns causes heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-p36g-m864-jrh5

A weakness has been identified in Tenda M3 1.0.0.13(4903). Impacted is the function formSetRemoteInternetLanInfo of the file /goform/setInternetLanInfo. This manipulation of the argument portIp/portMask/portGateWay/portDns/portSecDns causes heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2026-00326

Уязвимость функции formSetRemoteInternetLanInfo() (/goform/setInternetLanInfo) микропрограммного обеспечения маршрутизаторов Tenda M3, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу