<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4565 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4565/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 23 Mar 2026 01:16:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4565/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda AC21 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac21-buffer-overflow/</link><pubDate>Mon, 23 Mar 2026 01:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac21-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Tenda AC21 firmware version 16.03.08.16, allowing remote attackers to execute arbitrary code by manipulating arguments to the formSetQosBand function.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-4565, affects Tenda AC21 routers running firmware version 16.03.08.16. The flaw resides in the <code>formSetQosBand</code> function within the <code>/goform/SetNetControlList</code> file. Attackers can exploit this vulnerability by crafting malicious argument lists in HTTP requests, leading to arbitrary code execution on the device. The vulnerability can be exploited remotely and a proof-of-concept exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation allows attackers to gain complete control over the router, potentially compromising connected devices and network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda AC21 router with firmware version 16.03.08.16.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SetNetControlList</code> endpoint.</li>
<li>The POST request includes a specially crafted argument list designed to overflow the buffer in the <code>formSetQosBand</code> function.</li>
<li>The router processes the HTTP request and passes the malicious arguments to the vulnerable function.</li>
<li>The <code>formSetQosBand</code> function attempts to copy the oversized argument list into a fixed-size buffer, triggering a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>The attacker gains control of the program execution flow and injects malicious code.</li>
<li>The injected code executes with elevated privileges, granting the attacker complete control over the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Tenda AC21 router. This can lead to a variety of malicious outcomes, including: complete device compromise, modification of router settings, interception of network traffic, deployment of malware to connected devices, and use of the router as a botnet node. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploit could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/SetNetControlList</code> with unusually long or malformed arguments (see rule: &ldquo;Detect Suspicious POST Requests to SetNetControlList&rdquo;).</li>
<li>Implement rate limiting on HTTP POST requests to prevent attackers from quickly exploiting the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda AC21 Buffer Overflow Attempt&rdquo; to identify exploitation attempts based on specific patterns in HTTP requests.</li>
<li>Consider blocking traffic from known exploit sources, if available.</li>
<li>Upgrade to a patched firmware version as soon as it becomes available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>ac21</category><category>buffer_overflow</category><category>cve-2026-4565</category><category>router</category></item></channel></rss>