Skip to content
Threat Feed
critical advisory

Tenda AC21 Router Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in Tenda AC21 firmware version 16.03.08.16, allowing remote attackers to execute arbitrary code by manipulating arguments to the formSetQosBand function.

A critical buffer overflow vulnerability, CVE-2026-4565, affects Tenda AC21 routers running firmware version 16.03.08.16. The flaw resides in the formSetQosBand function within the /goform/SetNetControlList file. Attackers can exploit this vulnerability by crafting malicious argument lists in HTTP requests, leading to arbitrary code execution on the device. The vulnerability can be exploited remotely and a proof-of-concept exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation allows attackers to gain complete control over the router, potentially compromising connected devices and network traffic.

Attack Chain

  1. Attacker identifies a vulnerable Tenda AC21 router with firmware version 16.03.08.16.
  2. The attacker crafts a malicious HTTP POST request targeting the /goform/SetNetControlList endpoint.
  3. The POST request includes a specially crafted argument list designed to overflow the buffer in the formSetQosBand function.
  4. The router processes the HTTP request and passes the malicious arguments to the vulnerable function.
  5. The formSetQosBand function attempts to copy the oversized argument list into a fixed-size buffer, triggering a buffer overflow.
  6. The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.
  7. The attacker gains control of the program execution flow and injects malicious code.
  8. The injected code executes with elevated privileges, granting the attacker complete control over the router.

Impact

Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Tenda AC21 router. This can lead to a variety of malicious outcomes, including: complete device compromise, modification of router settings, interception of network traffic, deployment of malware to connected devices, and use of the router as a botnet node. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploit could impact thousands of users.

Recommendation

  • Monitor web server logs for suspicious POST requests to /goform/SetNetControlList with unusually long or malformed arguments (see rule: “Detect Suspicious POST Requests to SetNetControlList”).
  • Implement rate limiting on HTTP POST requests to prevent attackers from quickly exploiting the vulnerability.
  • Deploy the Sigma rule “Detect Tenda AC21 Buffer Overflow Attempt” to identify exploitation attempts based on specific patterns in HTTP requests.
  • Consider blocking traffic from known exploit sources, if available.
  • Upgrade to a patched firmware version as soon as it becomes available from the vendor.

Detection coverage 2

Detect Suspicious POST Requests to SetNetControlList

medium

Detects suspicious POST requests to the /goform/SetNetControlList endpoint, potentially indicating an exploitation attempt.

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

Detect Tenda AC21 Buffer Overflow Attempt

critical

Detects attempts to exploit the buffer overflow vulnerability in Tenda AC21 routers by identifying overly long arguments in the query string.

sigma tactics: execution techniques: T1203 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →