CVE-2025-15253
Unknown Unknown - Not Provided
Remote Stack-Based Buffer Overflow in Tenda M3 /goform/exeCommand

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: VulDB

Description
A vulnerability has been found in Tenda M3 1.0.0.13(4903). The impacted element is an unknown function of the file /goform/exeCommand. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tenda m3 1.0.0.13
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Tenda M3 device, specifically in an unknown function within the file /goform/exeCommand. It involves manipulation of the argument 'cmdinput' which leads to a stack-based buffer overflow. This type of vulnerability allows an attacker to overwrite parts of the memory stack, potentially enabling remote code execution or causing the device to crash. The attack can be launched remotely and the exploit has been publicly disclosed.


How can this vulnerability impact me? :

The vulnerability can have severe impacts including unauthorized remote code execution, which may allow attackers to take control of the affected device. It can also lead to denial of service by crashing the device. Because the exploit is publicly known, the risk of attack is higher, potentially compromising the security and availability of the device and any network it is connected to.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for suspicious POST requests to the /goform/exeCommand endpoint containing the cmdinput parameter with unusually long or malformed input that could trigger a stack-based buffer overflow. Since the vulnerability is exploited via crafted POST requests, network traffic inspection tools like Wireshark or tcpdump can be used to capture such requests. Additionally, using curl or similar tools to send test POST requests to /goform/exeCommand with crafted cmdinput payloads can help verify if the system is vulnerable. Example command to test (replace <router_ip>): curl -X POST http://<router_ip>/goform/exeCommand -d "cmdinput=AAAA..." (with a long string of 'A's to test buffer overflow). Monitoring logs for crashes or abnormal behavior after such requests can also indicate exploitation attempts. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include replacing the affected Tenda M3 router running firmware version 1.0.0.13(4903) with a secure version or different device, as no known countermeasures or patches are currently available. Restricting remote access to the router's management interface, such as disabling remote administration or limiting access via firewall rules, can reduce exposure. Monitoring network traffic for exploitation attempts and applying network-level protections like intrusion detection/prevention systems can help mitigate risk until a fix is available. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart