First published: Fri Jul 01 2022(Updated: )
Tenda M3 V1.0.0.12 was discovered to contain multiple stack overflow vulnerabilities via the ssidList, storeName, and trademark parameters in the function formSetStoreWeb.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda M3 | =1.0.0.12 | |
Tenda M3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32036 has been classified as a high severity vulnerability due to the potential for remote code execution via stack overflow.
To resolve CVE-2022-32036, users should update Tenda M3 firmware to version 1.0.0.13 or later, which addresses these vulnerabilities.
CVE-2022-32036 specifically affects Tenda M3 devices running firmware version 1.0.0.12.
CVE-2022-32036 involves multiple stack overflow vulnerabilities through the ssidList, storeName, and trademark parameters in the formSetStoreWeb function.
Yes, exploitation of CVE-2022-32036 can lead to unauthorized access and potential control of the affected Tenda M3 devices.