<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HG3 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/hg3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/hg3/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</guid><description>A stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda HG3 version 2.0. The vulnerability exists within the <code>formUploadConfig</code> function of the <code>/boaform/formIPv6Routing</code> file. A remote attacker can exploit this by manipulating the <code>destNet</code> argument, potentially leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-7151, has a publicly available exploit, increasing the risk of exploitation. This poses a significant threat to users of Tenda HG3 v2.0 routers, potentially allowing attackers to gain unauthorized access and control over the device. The CVSS v3.1 score is rated as 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda HG3 v2.0 router with default or known credentials, or no authentication at all.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/boaform/formIPv6Routing</code>.</li>
<li>The request targets the <code>formUploadConfig</code> function.</li>
<li>The <code>destNet</code> argument within the HTTP POST data is manipulated with a string exceeding the buffer size.</li>
<li>The <code>formUploadConfig</code> function processes the oversized <code>destNet</code> argument without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions on the stack.</li>
<li>The attacker gains arbitrary code execution on the device by overwriting the return address or other critical data on the stack.</li>
<li>The attacker can then leverage this to gain full control of the device, potentially modifying settings, injecting malware, or using it as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda HG3 v2.0 router. This could lead to complete compromise of the device, allowing the attacker to monitor network traffic, change router settings, or use the device as a launchpad for further attacks against other devices on the network. Given the potential for widespread exploitation due to the publicly available exploit, a large number of Tenda HG3 v2.0 users are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/boaform/formIPv6Routing</code> with excessively long <code>destNet</code> parameters to detect potential exploit attempts (see example Sigma rule below).</li>
<li>Implement rate limiting for requests to <code>/boaform/formIPv6Routing</code> to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches or firmware updates from Tenda to address CVE-2026-7151 on vulnerable HG3 2.0 devices.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting the <code>destNet</code> parameter in <code>/boaform/formIPv6Routing</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7151</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item></channel></rss>