<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Buffer_overflow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/buffer_overflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/buffer_overflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>SysGauge Pro 4.6.12 Local Buffer Overflow Vulnerability (CVE-2018-25307)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sysgauge-bo/</link><pubDate>Wed, 29 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sysgauge-bo/</guid><description>SysGauge Pro 4.6.12 is vulnerable to a local buffer overflow in the Register function, allowing local attackers to overwrite the structured exception handler and execute arbitrary code by supplying a crafted unlock key during registration.</description><content:encoded><![CDATA[<p>SysGauge Pro version 4.6.12 is susceptible to a local buffer overflow vulnerability (CVE-2018-25307) within its registration process. This vulnerability allows a local attacker to gain arbitrary code execution with the privileges of the SysGauge Pro application. Specifically, by providing a maliciously crafted &ldquo;Unlock Key&rdquo; during the registration, an attacker can overwrite the Structured Exception Handler (SEH). This overwrite allows the injection of shellcode, leading to the execution of attacker-controlled code within the context of the application. This is a local vulnerability, meaning the attacker needs local system access to exploit it. The report dates back to 2018, but was only recently published in the NVD database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to the target system.</li>
<li>Attacker identifies that SysGauge Pro 4.6.12 is installed.</li>
<li>Attacker launches SysGauge Pro.</li>
<li>Attacker initiates the registration process within SysGauge Pro.</li>
<li>Attacker provides a crafted &ldquo;Unlock Key&rdquo; containing shellcode designed to overwrite the Structured Exception Handler (SEH).</li>
<li>The application attempts to process the overly long &ldquo;Unlock Key&rdquo; without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting the SEH with the attacker&rsquo;s shellcode address.</li>
<li>When an exception occurs within the application, the overwritten SEH is invoked, redirecting execution to the attacker&rsquo;s shellcode, leading to arbitrary code execution with application privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with the privileges of the SysGauge Pro application. This could lead to complete system compromise if the application is running with elevated privileges. The impact includes potential data theft, modification of system settings, or installation of malware. Given that this is a local exploit, the primary risk is to systems where untrusted users have local access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for SysGauge Pro (SysGauge.exe) spawning unusual child processes to detect potential exploitation attempts, using a <code>process_creation</code> Sigma rule.</li>
<li>Consider deploying application control or whitelisting to prevent execution of unsigned or untrusted executables within the SysGauge Pro process.</li>
<li>Since no patch is available, consider uninstalling SysGauge Pro 4.6.12 from systems where the risk outweighs the benefit of the software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>buffer_overflow</category><category>privilege_escalation</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-bo/</link><pubDate>Mon, 27 Apr 2026 04:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-bo/</guid><description>A buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 in the `fromGstDhcpSetSer` function, allowing remote attackers to execute arbitrary code by manipulating the 'dips' argument via a crafted HTTP request to `/goform/GstDhcpSetSer`.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7081, affects Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromGstDhcpSetSer</code> function within the <code>/goform/GstDhcpSetSer</code> file, a component of the device&rsquo;s httpd service. Successful exploitation allows a remote attacker to execute arbitrary code on the device. Publicly available exploit code increases the risk of widespread exploitation. This vulnerability poses a significant threat as it can lead to complete compromise of the affected device, potentially allowing attackers to gain unauthorized access to the network, steal sensitive information, or use the device as part of a botnet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda F456 router (version 1.0.0.5) exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/GstDhcpSetSer</code> endpoint.</li>
<li>The HTTP request includes the <code>dips</code> argument, which is intentionally oversized to trigger the buffer overflow.</li>
<li>The vulnerable <code>fromGstDhcpSetSer</code> function processes the request without proper bounds checking.</li>
<li>The oversized <code>dips</code> argument overwrites adjacent memory regions on the stack.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address with an address pointing to attacker-controlled code.</li>
<li>The <code>fromGstDhcpSetSer</code> function returns, causing execution to jump to the attacker&rsquo;s code.</li>
<li>The attacker&rsquo;s code executes with the privileges of the httpd process, potentially leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F456 router. This can result in complete device compromise, including the ability to modify device settings, intercept network traffic, and potentially use the compromised device as a pivot point for further attacks within the network. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, making this a significant security concern.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/GstDhcpSetSer</code> with unusually long <code>dips</code> parameter values to detect potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule <code>Detect Tenda F456 Buffer Overflow Attempt</code> to identify malicious HTTP requests.</li>
<li>Since no patch is available, consider replacing the affected Tenda F456 routers (version 1.0.0.5) with more secure alternatives.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>router</category></item><item><title>Tenda F451 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-buffer-overflow/</link><pubDate>Mon, 20 Apr 2026 11:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6631) in Tenda F451 router version 1.0.0.7_cn_svn7958 allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/webExcptypemanFilter component.</description><content:encoded><![CDATA[<p>CVE-2026-6631 is a critical buffer overflow vulnerability affecting Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. The vulnerability resides in the <code>fromwebExcptypemanFilter</code> function within the <code>/goform/webExcptypemanFilter</code> component of the router&rsquo;s <code>httpd</code> web server. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request with an overly long &lsquo;page&rsquo; parameter. Publicly available exploits exist, increasing the risk of widespread exploitation. Successful exploitation allows attackers to execute arbitrary code on the router, potentially leading to full device compromise and network access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F451 router exposed to the internet.</li>
<li>Attacker crafts a malicious HTTP GET or POST request targeting <code>/goform/webExcptypemanFilter</code>.</li>
<li>The crafted request includes the <code>page</code> parameter with a payload exceeding the buffer size allocated for it.</li>
<li>The <code>httpd</code> server processes the request and passes the <code>page</code> parameter to the vulnerable <code>fromwebExcptypemanFilter</code> function.</li>
<li>Due to the lack of proper bounds checking, the overly long <code>page</code> parameter overwrites adjacent memory regions on the stack.</li>
<li>The attacker carefully designs the overflow payload to overwrite the return address on the stack with the address of malicious code injected elsewhere in memory.</li>
<li>The <code>fromwebExcptypemanFilter</code> function completes execution and attempts to return, jumping to the attacker-controlled address.</li>
<li>The attacker&rsquo;s malicious code executes with the privileges of the <code>httpd</code> server, potentially gaining full control of the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6631 allows remote attackers to execute arbitrary code on vulnerable Tenda F451 routers. This can lead to complete device compromise, allowing attackers to modify router settings, intercept network traffic, or use the router as a point of entry for further attacks on the internal network. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, potentially impacting both home and small business networks. The availability of public exploits further increases the likelihood of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from Tenda to patch CVE-2026-6631.</li>
<li>Monitor web server logs for suspicious requests to <code>/goform/webExcptypemanFilter</code> with unusually long <code>page</code> parameters, using the Sigma rule <code>DetectTendaF451BufferOverflow</code>.</li>
<li>Implement network intrusion detection systems (IDS) to detect and block exploit attempts targeting CVE-2026-6631.</li>
<li>Consider deploying the Sigma rule <code>DetectTendaF451SuspiciousProcess</code> to identify unexpected processes spawned by the httpd daemon.</li>
<li>If patching is not immediately feasible, consider restricting access to the router&rsquo;s web interface from the public internet to mitigate the risk of remote exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer_overflow</category><category>cve-2026-6631</category><category>webserver</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-rce/</link><pubDate>Fri, 10 Apr 2026 00:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-rce/</guid><description>A stack-based buffer overflow vulnerability in the Tenda F451 router (version 1.0.0.7) allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the fromRouteStatic function of the /goform/RouteStatic file.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5989, affects the Tenda F451 router, specifically version 1.0.0.7. The vulnerability lies within the <code>fromRouteStatic</code> function of the <code>/goform/RouteStatic</code> file. By manipulating the <code>page</code> argument, a remote attacker can trigger a stack-based buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat as it allows unauthenticated remote attackers to compromise the router, potentially leading to network disruption, data theft, or use of the device in botnet activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda F451 router (version 1.0.0.7) exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/RouteStatic</code> endpoint.</li>
<li>The request includes a <code>page</code> argument with a payload designed to overflow the stack buffer in the <code>fromRouteStatic</code> function.</li>
<li>The vulnerable <code>fromRouteStatic</code> function processes the malicious <code>page</code> argument without proper bounds checking.</li>
<li>The buffer overflow overwrites critical data on the stack, including the return address.</li>
<li>Upon function return, control is redirected to the attacker-controlled memory region.</li>
<li>The attacker executes arbitrary code injected into the overflowed buffer, such as downloading and executing a reverse shell.</li>
<li>The attacker gains remote access to the router, potentially allowing further exploitation or network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5989 allows an attacker to gain complete control of the Tenda F451 router. This can lead to a variety of damaging outcomes, including denial-of-service attacks against the local network, interception of network traffic, modification of router settings, and the potential use of the compromised router as a node in a botnet. Given the widespread use of Tenda routers in home and small business environments, a large number of devices could be at risk if this vulnerability is actively exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/RouteStatic</code> containing abnormally long <code>page</code> arguments, as this is indicative of potential exploit attempts. Deploy the Sigma rule <code>Detect Tenda F451 Exploit Attempt</code> to detect these malicious requests.</li>
<li>Implement rate limiting on requests to the <code>/goform/RouteStatic</code> endpoint to mitigate potential denial-of-service attacks.</li>
<li>Since there is no patch available, consider replacing vulnerable Tenda F451 routers with more secure devices from other vendors.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>tenda</category><category>router</category><category>buffer_overflow</category><category>rce</category></item><item><title>D-Link DIR-605L Router Buffer Overflow Vulnerability (CVE-2026-5980)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-buffer-overflow/</link><pubDate>Thu, 09 Apr 2026 21:16:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in the D-Link DIR-605L router version 2.13B01, allowing a remote attacker to execute arbitrary code by manipulating the `curTime` argument in the `formSetMACFilter` function.</description><content:encoded><![CDATA[<p>CVE-2026-5980 is a critical buffer overflow vulnerability affecting the D-Link DIR-605L router, specifically version 2.13B01. The vulnerability resides in the <code>formSetMACFilter</code> function within the <code>/goform/formSetMACFilter</code> component&rsquo;s POST Request Handler. A remote attacker can exploit this by sending a crafted POST request with a malicious <code>curTime</code> argument, leading to a buffer overflow. Exploit code is publicly available. Due to the product&rsquo;s end-of-life status, no patch is available, making unpatched devices highly vulnerable. This allows for potential remote code execution and complete compromise of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-605L router (version 2.13B01) exposed to the internet.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/goform/formSetMACFilter</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>curTime</code> parameter, injecting a string exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s <code>formSetMACFilter</code> function processes the POST request without proper bounds checking on the <code>curTime</code> argument.</li>
<li>The oversized <code>curTime</code> string overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite critical data, such as return addresses or function pointers.</li>
<li>When the <code>formSetMACFilter</code> function attempts to return, the overwritten return address is used, redirecting execution to attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution on the router, potentially installing malware, changing configurations, or using the device for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5980 allows a remote attacker to gain complete control over the vulnerable D-Link DIR-605L router. Given that the affected product is no longer supported, a large number of legacy routers remain vulnerable. Attackers can leverage compromised routers to establish botnets, conduct man-in-the-middle attacks, or gain unauthorized access to internal networks connected to the router. The lack of patches elevates the severity, as affected users have no direct mitigation available other than replacing the device.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect D-Link DIR-605L Buffer Overflow Attempt</code> to identify malicious POST requests targeting the <code>/goform/formSetMACFilter</code> endpoint on D-Link DIR-605L devices.</li>
<li>Implement network segmentation to isolate potentially vulnerable D-Link DIR-605L routers to limit the impact of a successful compromise.</li>
<li>If possible, replace D-Link DIR-605L routers (version 2.13B01) with newer, supported devices to eliminate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>router</category><category>d-link</category></item><item><title>D-Link DIR-605L Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-bo/</link><pubDate>Thu, 09 Apr 2026 21:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-bo/</guid><description>A remote buffer overflow vulnerability exists in the D-Link DIR-605L version 2.13B01 due to improper handling of the 'curTime' argument in the '/goform/formVirtualServ' POST request handler, potentially allowing attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-5979, has been identified in D-Link DIR-605L router with firmware version 2.13B01. The vulnerability resides in the <code>formVirtualServ</code> function within the <code>/goform/formVirtualServ</code> component, specifically within the POST request handler. By manipulating the <code>curTime</code> argument, a remote attacker can trigger a buffer overflow. According to the NVD, an exploit is publicly available, increasing the risk of exploitation. This vulnerability affects end-of-life products, making patching impossible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable D-Link DIR-605L router running firmware 2.13B01.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>/goform/formVirtualServ</code> endpoint.</li>
<li>The POST request includes the <code>curTime</code> argument with a value exceeding the buffer&rsquo;s capacity.</li>
<li>The router&rsquo;s <code>formVirtualServ</code> function processes the POST request without proper bounds checking.</li>
<li>The oversized <code>curTime</code> value overwrites adjacent memory regions on the stack or heap.</li>
<li>The attacker carefully crafts the overflow payload to overwrite the return address.</li>
<li>Upon returning from the <code>formVirtualServ</code> function, control is transferred to the attacker-controlled address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability (CVE-2026-5979) can lead to complete compromise of the D-Link DIR-605L router. Attackers could potentially execute arbitrary code, enabling them to modify router settings, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Due to the product being end-of-life, a patch is not available. The number of vulnerable devices is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor webserver logs for requests to <code>/goform/formVirtualServ</code> with unusually long <code>curTime</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Suspiciously Long curTime Parameter in D-Link Routers&rdquo;).</li>
<li>Implement network intrusion detection system (IDS) rules to detect suspicious traffic patterns associated with buffer overflow exploits targeting web interfaces.</li>
<li>Since this device is end-of-life, consider replacing the D-Link DIR-605L router with a supported model to mitigate the risk, as there will be no patches issued.</li>
<li>Examine network traffic for unusual outbound connections originating from D-Link DIR-605L routers to identify potentially compromised devices (see Sigma rule &ldquo;Detect Outbound Connections from D-Link Routers&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dlink</category><category>router</category><category>buffer_overflow</category><category>cve-2026-5979</category></item><item><title>JAD Java Decompiler Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-jad-decompiler-overflow/</link><pubDate>Sat, 28 Mar 2026 12:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jad-decompiler-overflow/</guid><description>JAD Java Decompiler 1.5.8e-1kali1 and prior is vulnerable to a stack-based buffer overflow, allowing attackers to execute arbitrary code by providing overly long input to the jad command leading to a return-oriented programming chain execution and shell spawning.</description><content:encoded><![CDATA[<p>JAD Java Decompiler version 1.5.8e-1kali1 and prior contains a critical stack-based buffer overflow vulnerability (CVE-2017-20227). An attacker can exploit this flaw by crafting a malicious input that, when processed by the <code>jad</code> command, overflows the stack buffer. This overflow can be leveraged to overwrite critical memory regions, allowing the attacker to inject and execute arbitrary code. The successful exploitation results in the execution of a return-oriented programming (ROP) chain, ultimately leading to the spawning of a shell with the privileges of the user running the vulnerable JAD decompiler. This vulnerability poses a significant risk to developers and systems utilizing the affected versions of JAD, particularly in environments where untrusted or externally sourced Java bytecode is routinely decompiled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Java class file or other input designed to trigger the buffer overflow in JAD.</li>
<li>The attacker lures a user or system into using the vulnerable JAD decompiler version 1.5.8e-1kali1 or prior to decompile the malicious input file using the <code>jad</code> command.</li>
<li>JAD attempts to process the overly long input string, exceeding the boundaries of a stack-based buffer.</li>
<li>The buffer overflow corrupts the stack, overwriting return addresses and other critical data.</li>
<li>The attacker-controlled return addresses are used to construct a return-oriented programming (ROP) chain.</li>
<li>The ROP chain executes a series of small code snippets already present in the JAD binary or system libraries to achieve a desired outcome, such as disabling security features or preparing for shell execution.</li>
<li>The ROP chain prepares the environment and executes a system call to spawn a shell.</li>
<li>The attacker gains arbitrary code execution within the context of the user running JAD.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2017-20227 can lead to arbitrary code execution, potentially granting an attacker complete control over the affected system. Given a CVSS v3.1 base score of 9.8 (Critical), this vulnerability poses a severe risk. The impact includes full compromise of confidentiality, integrity, and availability. The attack requires no privileges and no user interaction. This can enable lateral movement within a network, data exfiltration, installation of malware, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement a network-level block or alert for outbound connections originating from the system running the JAD decompiler, especially if the user routinely decompiles untrusted class files. (Log Source: <code>network_connection</code>)</li>
<li>Monitor process executions for the <code>jad</code> command with unusually long command-line arguments, indicative of a potential buffer overflow attempt. Deploy the provided Sigma rule for detection. (Log Source: <code>process_creation</code>)</li>
<li>Consider using alternative Java decompilers that are not vulnerable to this specific stack-based buffer overflow.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>java_decompiler</category></item><item><title>Zen C Compiler Stack-Based Buffer Overflow (CVE-2026-33491)</title><link>https://feed.craftedsignal.io/briefs/2026-03-zen-c-overflow/</link><pubDate>Fri, 27 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-zen-c-overflow/</guid><description>A stack-based buffer overflow vulnerability in Zen C compiler versions before 0.4.4 allows attackers to crash the compiler or potentially execute arbitrary code via a crafted `.zc` source file with overly long identifiers.</description><content:encoded>&lt;p>Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability (CVE-2026-33491) exists within the Zen C compiler. This flaw allows a malicious actor to craft a Zen C source file (&lt;code>.zc&lt;/code>) containing excessively long struct, function, or trait identifiers. Successful exploitation of this vulnerability can lead to a compiler crash, causing disruption to development workflows, or potentially allow the attacker to…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>compiler</category></item><item><title>Tenda AC21 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac21-buffer-overflow/</link><pubDate>Mon, 23 Mar 2026 01:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac21-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Tenda AC21 firmware version 16.03.08.16, allowing remote attackers to execute arbitrary code by manipulating arguments to the formSetQosBand function.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-4565, affects Tenda AC21 routers running firmware version 16.03.08.16. The flaw resides in the <code>formSetQosBand</code> function within the <code>/goform/SetNetControlList</code> file. Attackers can exploit this vulnerability by crafting malicious argument lists in HTTP requests, leading to arbitrary code execution on the device. The vulnerability can be exploited remotely and a proof-of-concept exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation allows attackers to gain complete control over the router, potentially compromising connected devices and network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda AC21 router with firmware version 16.03.08.16.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SetNetControlList</code> endpoint.</li>
<li>The POST request includes a specially crafted argument list designed to overflow the buffer in the <code>formSetQosBand</code> function.</li>
<li>The router processes the HTTP request and passes the malicious arguments to the vulnerable function.</li>
<li>The <code>formSetQosBand</code> function attempts to copy the oversized argument list into a fixed-size buffer, triggering a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>The attacker gains control of the program execution flow and injects malicious code.</li>
<li>The injected code executes with elevated privileges, granting the attacker complete control over the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Tenda AC21 router. This can lead to a variety of malicious outcomes, including: complete device compromise, modification of router settings, interception of network traffic, deployment of malware to connected devices, and use of the router as a botnet node. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploit could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/SetNetControlList</code> with unusually long or malformed arguments (see rule: &ldquo;Detect Suspicious POST Requests to SetNetControlList&rdquo;).</li>
<li>Implement rate limiting on HTTP POST requests to prevent attackers from quickly exploiting the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda AC21 Buffer Overflow Attempt&rdquo; to identify exploitation attempts based on specific patterns in HTTP requests.</li>
<li>Consider blocking traffic from known exploit sources, if available.</li>
<li>Upgrade to a patched firmware version as soon as it becomes available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>ac21</category><category>buffer_overflow</category><category>cve-2026-4565</category><category>router</category></item></channel></rss>