Platform
tenda
Component
tenda
Fixed in
1.0.1
CVE-2026-5567 describes a buffer overflow vulnerability discovered in the Tenda M3 router, specifically within the /goform/setAdvPolicyData endpoint. This flaw allows a remote attacker to manipulate the policyType argument, potentially leading to arbitrary code execution. The vulnerability affects versions 1.0.0 through 1.0.0.10 of the Tenda M3 firmware. A public exploit is available, increasing the risk of immediate exploitation.
Successful exploitation of CVE-2026-5567 allows an attacker to execute arbitrary code on the vulnerable Tenda M3 router. This could lead to complete compromise of the device, enabling attackers to modify router configurations, intercept network traffic, and potentially pivot to other systems on the network. Given the router's role as a gateway, a successful attack could grant access to the entire internal network. The availability of a public exploit significantly increases the likelihood of widespread exploitation, particularly targeting devices with default or easily guessable credentials. The impact is amplified in environments where the router is used for VPN access or hosts sensitive data.
CVE-2026-5567 has been publicly disclosed and a proof-of-concept exploit is available, indicating a high probability of exploitation. The vulnerability was published on 2026-04-05. It is not currently listed on CISA KEV, but the availability of a public exploit warrants close monitoring. Active campaigns targeting vulnerable Tenda M3 routers are possible, especially given the router's popularity and the ease of exploitation.
Exploit Status
EPSS
0.05% (15% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-5567 is to upgrade the Tenda M3 firmware to a patched version as soon as it becomes available from Tenda. Until a patch is released, consider implementing temporary workarounds. These include deploying a Web Application Firewall (WAF) to filter malicious requests targeting the /goform/setAdvPolicyData endpoint, specifically looking for unusual or excessively long policyType values. Network segmentation can also limit the potential blast radius of a successful attack by isolating the router from critical systems. Monitor router logs for suspicious activity related to the affected endpoint. After upgrade, confirm by attempting to trigger the vulnerability and verifying that it is no longer exploitable.
Update the firmware of your Tenda M3 device to the latest version available from the manufacturer. Refer to the official Tenda website or product documentation for instructions on how to update the firmware.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5567 is a buffer overflow vulnerability in Tenda M3 routers versions 1.0.0–1.0.0.10, allowing remote code execution via manipulation of the policyType argument in the /goform/setAdvPolicyData endpoint.
You are affected if you are using a Tenda M3 router running versions 1.0.0 through 1.0.0.10 and have not yet upgraded to a patched firmware version.
The recommended fix is to upgrade to a patched firmware version from Tenda. Until a patch is available, implement temporary mitigations like WAF rules and network segmentation.
A public exploit is available, indicating a high probability of active exploitation. Monitor your router logs and network traffic for suspicious activity.
Please refer to the Tenda website or security advisories for the latest information and official advisory regarding CVE-2026-5567.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.