CVE-2025-15252: Stack-based Buffer Overflow in Tenda M3
A flaw has been found in Tenda M3 1.0.0.13(4903). The affected element is the function formSetRemoteDhcpForAp of the file /goform/setDhcpAP. This manipulation of the argument startip/endip/leasetime/gateway/dns1/dns2 causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.
CVE-2025-15252: Stack-based Buffer Overflow in Tenda M3
Description
A flaw has been found in Tenda M3 1.0.0.13(4903). The affected element is the function formSetRemoteDhcpForAp of the file /goform/setDhcpAP. This manipulation of the argument startip/endip/leasetime/gateway/dns1/dns2 causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-29T09:16:57.696Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6953e5ad71a94549f1ccd703
Added to database: 12/30/2025, 2:46:05 PM
Last updated: 12/30/2025, 4:12:17 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-6060: CWE-532 Insertion of Sensitive Information into Log File in Phloc Webscopes
CriticalCVE-2025-15254: OS Command Injection in Tenda W6-S
MediumCVE-2025-15253: Stack-based Buffer Overflow in Tenda M3
HighCVE-2023-54290
UnknownCVE-2023-54256
UnknownActions
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.