cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-51092,https://securityvulnerability.io/vulnerability/CVE-2023-51092,Stack Overflow Vulnerability in Tenda M3 from Tenda,"A stack overflow vulnerability has been identified in the Tenda M3 device, specifically in version V1.0.0.12. This vulnerability arises from a flaw in the function responsible for initiating upgrades, making it possible for an attacker to exploit this weakness and execute arbitrary code. Such vulnerabilities can lead to unauthorized control over the device, potentially compromising the entire network security framework. It is essential for users to apply necessary updates or mitigations to safeguard their devices against potential exploits.",Tenda,M3 Firmware,9.8,CRITICAL,0.0017999999690800905,false,,false,false,false,,,false,false,,2023-12-26T00:00:00.000Z,0 CVE-2022-38562,https://securityvulnerability.io/vulnerability/CVE-2022-38562,Heap Buffer Overflow in Tenda M3 Router,"The Tenda M3 router has been identified with a heap buffer overflow vulnerability within the function formSetFixTools. This flaw can be exploited by attackers through the manipulation of the lan parameter, potentially leading to a Denial of Service (DoS) condition. As a result, affected devices could become unresponsive, impacting users' connectivity and overall network stability.",Tenda,M3 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-28T16:50:17.000Z,0 CVE-2022-38564,https://securityvulnerability.io/vulnerability/CVE-2022-38564,Buffer Overflow Vulnerability in Tenda M3 Router,"The Tenda M3 router suffers from a buffer overflow vulnerability in the formSetPicListItem function. An attacker can exploit this weakness via the adItemUID parameter, potentially leading to a denial of service condition. This vulnerability highlights the importance of securing router firmware to prevent unauthorized access and ensure device stability.",Tenda,M3 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-28T16:49:16.000Z,0 CVE-2022-38565,https://securityvulnerability.io/vulnerability/CVE-2022-38565,Heap Buffer Overflow in Tenda M3 by Tenda Technologies,"The Tenda M3 device is susceptible to a heap buffer overflow vulnerability in its formEmailTest function. This can be exploited through the mailpwd parameter, enabling unauthorized attackers to disrupt the service by causing a Denial of Service (DoS) condition. Such vulnerabilities pose a significant risk to network security, potentially leading to service outages and operational disruptions.",Tenda,M3 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-28T16:48:04.000Z,0 CVE-2022-38566,https://securityvulnerability.io/vulnerability/CVE-2022-38566,Heap Buffer Overflow Vulnerability in Tenda M3 by Tenda,"The Tenda M3 device version V1.0.0.12(4856) is susceptible to a heap buffer overflow vulnerability in the function formEmailTest. This security flaw can be exploited by attackers through manipulation of the mailname parameter, potentially leading to a Denial of Service (DoS) condition. This vulnerability highlights the importance of implementing proper input validation and security measures in network devices.",Tenda,M3 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-28T16:47:13.000Z,0 CVE-2022-38567,https://securityvulnerability.io/vulnerability/CVE-2022-38567,Stack Overflow Vulnerability in Tenda M3 by Tenda,"A vulnerability has been identified in Tenda M3 where the function formSetAdConfigInfo is susceptible to a stack overflow. Through manipulation of the authIPs parameter, an attacker could exploit this vulnerability to execute a Denial of Service (DoS) attack, resulting in potential service interruptions.",Tenda,M3 Firmware,7.5,HIGH,0.0016400000313296914,false,,false,false,false,,,false,false,,2022-08-28T16:46:04.000Z,0 CVE-2022-38563,https://securityvulnerability.io/vulnerability/CVE-2022-38563,Heap Buffer Overflow Vulnerability in Tenda M3 by Tenda,"The Tenda M3 device version V1.0.0.12(4856) is susceptible to a heap buffer overflow vulnerability located in the formSetFixTools function. This flaw enables attackers to exploit the MACAddr parameter to trigger a Denial of Service (DoS), potentially rendering the device unresponsive and disrupting normal functionality. Prompt awareness and remediation measures are essential to safeguard against such threats.",Tenda,M3 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-28T16:44:28.000Z,0 CVE-2022-38568,https://securityvulnerability.io/vulnerability/CVE-2022-38568,Heap Buffer Overflow in Tenda M3 Router,"A heap buffer overflow vulnerability exists in Tenda M3 routers, specifically in the formSetFixTools function. This flaw can be exploited by attackers to trigger a Denial of Service (DoS) condition through manipulation of the hostname parameter. It is essential for users of affected versions to apply necessary security updates to mitigate potential risks.",Tenda,M3 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-28T16:43:16.000Z,0 CVE-2022-38569,https://securityvulnerability.io/vulnerability/CVE-2022-38569,Stack Overflow in Tenda M3 Router Firmware,"A stack overflow vulnerability exists in the Tenda M3 Router's formDelAd function. This flaw can be exploited to execute arbitrary code, jeopardizing systems' integrity and potentially compromising sensitive user data. It is crucial for users to apply necessary fixes to mitigate any associated risks.",Tenda,M3 Firmware,7.5,HIGH,0.0016400000313296914,false,,false,false,false,,,false,false,,2022-08-28T16:41:09.000Z,0 CVE-2022-38571,https://securityvulnerability.io/vulnerability/CVE-2022-38571,Buffer Overflow Vulnerability in Tenda M3 by Tenda,"The Tenda M3 device has a vulnerability identified as a buffer overflow in the function formSetGuideListItem. This flaw can potentially allow an attacker to execute arbitrary code and gain unauthorized access, leading to significant security risks for users of the affected version.",Tenda,M3 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-28T16:39:52.000Z,0 CVE-2022-38570,https://securityvulnerability.io/vulnerability/CVE-2022-38570,Stack Overflow Vulnerability in Tenda M3 by Tenda,"A stack overflow vulnerability has been identified in Tenda M3 version 1.0.0.12(4856). This flaw is present in the function formDelPushedAd, which processes the adPushUID parameter. Attackers can exploit this vulnerability to trigger a Denial of Service (DoS), compromising the availability of the device. For more details and potential mitigations, check the reference below.",Tenda,M3 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-28T16:37:21.000Z,0 CVE-2022-32034,https://securityvulnerability.io/vulnerability/CVE-2022-32034,Stack Overflow Vulnerability in Tenda M3 Router,"The Tenda M3 Router, version V1.0.0.12, is vulnerable to a stack overflow issue through the 'items' parameter in the function 'formdelMasteraclist'. This vulnerability may allow an attacker to exploit the function and execute arbitrary code, potentially compromising the device's integrity and security. Users of the Tenda M3 Router should take immediate action to mitigate risks associated with this vulnerability.",Tenda,M3 Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-07-01T17:27:57.000Z,0 CVE-2022-32035,https://securityvulnerability.io/vulnerability/CVE-2022-32035,Stack Overflow Vulnerability in Tenda M3 Products,"The Tenda M3 version V1.0.0.12 is susceptible to a stack overflow vulnerability found in the formMasterMng function. This flaw may allow an attacker to manipulate stack memory, potentially leading to unwanted behaviors or unauthorized access. Users are encouraged to review the security implications and apply necessary mitigations to safeguard their devices.",Tenda,M3 Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-07-01T17:27:56.000Z,0 CVE-2022-32036,https://securityvulnerability.io/vulnerability/CVE-2022-32036,Stack Overflow Vulnerabilities in Tenda M3 Router Firmware,"The Tenda M3 router firmware version 1.0.0.12 has been found to have multiple stack overflow vulnerabilities. These vulnerabilities are triggered through the ssidList, storeName, and trademark parameters within the formSetStoreWeb function. Exploiting these vulnerabilities may allow malicious users to execute arbitrary code, posing significant risks to network security.",Tenda,M3 Firmware,7.5,HIGH,0.001290000043809414,false,,false,false,false,,,false,false,,2022-07-01T17:27:55.000Z,0 CVE-2022-32037,https://securityvulnerability.io/vulnerability/CVE-2022-32037,Stack Overflow Vulnerability in Tenda M3 Wireless Router,"The Tenda M3 wireless router, specifically version V1.0.0.12, is susceptible to a stack overflow vulnerability within the function formSetAPCfg. This flaw may be exploited by attackers to inject malicious payloads or execute arbitrary code, jeopardizing device integrity and enabling unauthorized access to network resources. Users are advised to monitor updates and apply security patches promptly to mitigate potential risks associated with this vulnerability.",Tenda,M3 Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-07-01T17:27:55.000Z,0 CVE-2022-32039,https://securityvulnerability.io/vulnerability/CVE-2022-32039,Stack Overflow Vulnerability in Tenda M3 Router,"The Tenda M3 Router version 1.0.0.12 has been identified with a stack overflow vulnerability in its DHCP processing mechanism, specifically through the listN parameter in the function fromDhcpListClient. This flaw can potentially allow an attacker to exploit the device, leading to unauthorized access or disruption of services. It highlights the importance of securing IoT devices and maintaining updated firmware to mitigate such vulnerabilities.",Tenda,M3 Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-07-01T17:27:54.000Z,0 CVE-2022-32040,https://securityvulnerability.io/vulnerability/CVE-2022-32040,Stack Overflow Vulnerability in Tenda M3 Router by Tenda,"The Tenda M3 Router, specifically version V1.0.0.12, is exposed to a stack overflow vulnerability through the formSetCfm function. This weakness may allow an attacker to disrupt the normal operation of the device, possibly leading to unauthorized access or service disruption. It is crucial for users to apply the necessary patches and updates to mitigate potential risks associated with this vulnerability.",Tenda,M3 Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-07-01T17:27:53.000Z,0 CVE-2022-32041,https://securityvulnerability.io/vulnerability/CVE-2022-32041,Stack Overflow Vulnerability in Tenda M3 from Tenda,"A stack overflow vulnerability has been identified in the Tenda M3 router, specifically in version V1.0.0.12. The issue arises from improper handling of input data in the function formGetPassengerAnalyseData, which may allow an attacker to execute arbitrary code or cause denial-of-service conditions. This vulnerability highlights the importance of secure coding practices in IoT devices.",Tenda,M3 Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-07-01T17:27:51.000Z,0 CVE-2022-32043,https://securityvulnerability.io/vulnerability/CVE-2022-32043,Stack Overflow Vulnerability in Tenda M3 by Tenda,"The Tenda M3 product, specifically version V1.0.0.12, is susceptible to a stack overflow vulnerability via the function formSetAccessCodeInfo. This flaw can be exploited by attackers to manipulate the device's functionality, potentially leading to unauthorized access or compromise of sensitive information. Effective remediation is essential to protect devices and their networks from exploitation.",Tenda,M3 Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-07-01T17:27:49.000Z,0 CVE-2022-27076,https://securityvulnerability.io/vulnerability/CVE-2022-27076,Command Injection Vulnerability in Tenda M3 Router,"The Tenda M3 router has been identified with a command injection vulnerability in the /goform/delAd component. This issue allows attackers to execute arbitrary commands on the system by manipulating input parameters. If exploited, this vulnerability could lead to unauthorized access and potential takeover of the device.",Tenda,M3 Firmware,9.8,CRITICAL,0.1907999962568283,false,,false,false,false,,,false,false,,2022-03-24T00:15:00.000Z,0 CVE-2022-26536,https://securityvulnerability.io/vulnerability/CVE-2022-26536,Command Injection Vulnerability in Tenda M3 Router,"The Tenda M3 router has been found to contain a command injection vulnerability through its /goform/setFixTools component. This flaw enables an attacker to execute arbitrary commands on the system, potentially compromising the router's integrity and security. This vulnerability poses a significant risk as it can be exploited to gain unauthorized access to sensitive data and disrupt network functionality.",Tenda,M3 Firmware,9.8,CRITICAL,0.1907999962568283,false,,false,false,false,,,false,false,,2022-03-24T00:15:00.000Z,0 CVE-2022-27077,https://securityvulnerability.io/vulnerability/CVE-2022-27077,Command Injection Vulnerability in Tenda M3 Router by Tenda,"The Tenda M3 Router contains a command injection vulnerability in the /cgi-bin/uploadWeiXinPic component. This flaw allows attackers to execute arbitrary commands on the device, potentially compromising its security and functionality. Users of Tenda M3 1.10 V1.0.0.12(4856) should remain vigilant and consider implementing security measures to mitigate potential risks associated with this vulnerability.",Tenda,M3 Firmware,9.8,CRITICAL,0.1907999962568283,false,,false,false,false,,,false,false,,2022-03-24T00:15:00.000Z,0 CVE-2022-27078,https://securityvulnerability.io/vulnerability/CVE-2022-27078,Command Injection Vulnerability in Tenda M3 Router,"The Tenda M3 router version 1.10 V1.0.0.12(4856) is susceptible to a command injection vulnerability through its /goform/setAdInfoDetail component. This weakness allows an attacker to execute arbitrary commands on the affected system, potentially compromising the security and integrity of the router and its connected networks. Proper patching and security measures are essential to safeguard against such exploitation.",Tenda,M3 Firmware,9.8,CRITICAL,0.1907999962568283,false,,false,false,false,,,false,false,,2022-03-24T00:15:00.000Z,0 CVE-2022-27080,https://securityvulnerability.io/vulnerability/CVE-2022-27080,Command Injection Vulnerability in Tenda M3 Router,"The Tenda M3 router contains a command injection vulnerability via the /goform/setWorkmode component. This flaw allows an attacker to execute arbitrary commands on the affected system, potentially compromising the network's integrity and security. Ensuring that your router's firmware is updated and configured securely is essential to mitigate the risks associated with this vulnerability.",Tenda,M3 Firmware,9.8,CRITICAL,0.1907999962568283,false,,false,false,false,,,false,false,,2022-03-24T00:15:00.000Z,0 CVE-2022-27081,https://securityvulnerability.io/vulnerability/CVE-2022-27081,Command Injection Vulnerability in Tenda M3 Router,"A command injection vulnerability has been identified in the Tenda M3 router firmware version 1.10 V1.0.0.12 (4856). This flaw allows an attacker to execute arbitrary commands by exploiting the /goform/SetLanInfo component, potentially gaining unauthorized access to sensitive functions of the router. It is critical for users to ensure their devices are up-to-date and to review security configurations to mitigate potential risks associated with this vulnerability.",Tenda,M3 Firmware,9.8,CRITICAL,0.1907999962568283,false,,false,false,false,,,false,false,,2022-03-24T00:15:00.000Z,0