A flaw has been found in Tenda M3 1.0.0.12. Affected is the function formQuickIndex of the file /goform/QuickIndex. Executing manipulation of the argument PPPOEPassword can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 25 Aug 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda m3 Firmware
CPEs cpe:2.3:h:tenda:m3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:m3_firmware:1.0.0.12:*:*:*:*:*:*:*
Vendors & Products Tenda m3 Firmware

Sat, 23 Aug 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda m3
Vendors & Products Tenda
Tenda m3

Thu, 21 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda M3 1.0.0.12. Affected is the function formQuickIndex of the file /goform/QuickIndex. Executing manipulation of the argument PPPOEPassword can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
Title Tenda M3 QuickIndex formQuickIndex stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-08-21T13:23:24.023Z

Reserved: 2025-08-21T05:21:46.904Z

Link: CVE-2025-9298

cve-icon Vulnrichment

Updated: 2025-08-21T13:22:54.448Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-21T13:15:37.400

Modified: 2025-08-25T01:59:22.753

Link: CVE-2025-9298

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-23T10:55:44Z