CVE-2025-15232: Stack-based Buffer Overflow in Tenda M3
A vulnerability was identified in Tenda M3 1.0.0.13(4903). This vulnerability affects the function formSetAdPushInfo of the file /goform/setAdPushInfo. The manipulation of the argument mac/terminal leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
CVE-2025-15232: Stack-based Buffer Overflow in Tenda M3
Description
A vulnerability was identified in Tenda M3 1.0.0.13(4903). This vulnerability affects the function formSetAdPushInfo of the file /goform/setAdPushInfo. The manipulation of the argument mac/terminal leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-29T08:01:07.931Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6953833a71a94549f1add5e3
Added to database: 12/30/2025, 7:46:02 AM
Last updated: 12/30/2025, 10:35:04 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15243: SQL Injection in code-projects Simple Stock System
MediumCVE-2025-15242: Race Condition in PHPEMS
LowCVE-2025-15358: CWE-20 Improper Input Validation in Delta Electronics DVP-12SE11T
HighCVE-2025-15241: Open Redirect in CloudPanel Community Edition
MediumCVE-2025-15103: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Delta Electronics DVP-12SE11T
HighActions
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.