Tenda AC6 Stack-Based Buffer Overflow Vulnerability
A stack-based buffer overflow vulnerability in Tenda AC6 version 15.03.05.16 allows remote attackers to execute arbitrary code by manipulating the WANT/WANS argument in the /goform/WizardHandle POST request handler.
A critical stack-based buffer overflow vulnerability has been identified in Tenda AC6 router firmware version 15.03.05.16. The vulnerability, tracked as CVE-2026-4960, resides within the fromWizardHandle function of the /goform/WizardHandle component, which handles POST requests. A remote attacker can exploit this vulnerability by sending a crafted POST request with a manipulated WANT or WANS argument, leading to arbitrary code execution on the device. Public exploit code is available, increasing the risk of widespread exploitation. This vulnerability poses a significant threat, potentially allowing attackers to gain complete control over vulnerable routers and compromise connected networks.
Attack Chain
- Attacker identifies a Tenda AC6 router running firmware version 15.03.05.16.
- The attacker crafts a malicious POST request targeting the
/goform/WizardHandleendpoint. - Within the POST request, the attacker manipulates the
WANTorWANSargument to inject a payload exceeding the buffer size. - The router processes the POST request, passing the attacker-controlled input to the vulnerable
fromWizardHandlefunction. - The overflow occurs when the
fromWizardHandlefunction copies the attacker-supplied data into a fixed-size buffer on the stack without proper bounds checking. - The injected payload overwrites adjacent memory locations on the stack, including the return address.
- When the
fromWizardHandlefunction returns, it jumps to the attacker-controlled address. - The attacker gains arbitrary code execution on the router, potentially leading to complete system compromise.
Impact
Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the affected Tenda AC6 router. This can lead to a variety of malicious outcomes, including network hijacking, DNS poisoning, interception of network traffic, deployment of malware, and the creation of botnets. Given the widespread use of Tenda routers in home and small business networks, a large number of devices are potentially vulnerable. The CVSS v3.1 score of 8.8 reflects the high severity of this vulnerability.
Recommendation
- Apply any available firmware updates from Tenda to patch CVE-2026-4960.
- Monitor web server logs for suspicious POST requests to
/goform/WizardHandlewith abnormally longWANTorWANSparameters using the Sigma rule provided below. - Implement network intrusion detection system (NIDS) rules to detect exploit attempts targeting the
/goform/WizardHandleendpoint. - Restrict access to the router’s web interface from the public internet where possible to reduce the attack surface.
Detection coverage 2
Detect Tenda AC6 WizardHandle Buffer Overflow Attempt
criticalDetects suspicious POST requests to /goform/WizardHandle with excessively long WANT or WANS parameters, indicative of a buffer overflow attempt (CVE-2026-4960).
Detect Exploitation Attempt via HTTP POST Request to /goform/WizardHandle
highDetects attempts to exploit a vulnerability by sending a POST request to /goform/WizardHandle.
Detection queries are kept inside the platform. Get full rules →