Heap-Based Buffer Overflow in Tenda M3 Router
CVE-2025-15233
Key Information:
Badges
What is CVE-2025-15233?
A security vulnerability has been identified in the Tenda M3 router firmware version 1.0.0.13(4903), specifically in the formSetAdInfoDetails function located in the /goform/setAdInfoDetail file. This issue arises due to improper handling of multiple input parameters, which include adName, smsPassword, smsAccount, weixinAccount, weixinName, smsSignature, adRedirectUrl, adCopyRight, smsContent, and adItemUID. Remote exploitation of this flaw can lead to a heap-based buffer overflow, allowing attackers to manipulate memory and potentially execute arbitrary code. Given that the exploit has been made public, users of the affected product are urged to take protective measures.
Affected Version(s)
M3 1.0.0.13(4903)
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved