<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4960 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4960/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 17:16:30 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4960/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda AC6 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac6-overflow/</link><pubDate>Fri, 27 Mar 2026 17:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac6-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda AC6 version 15.03.05.16 allows remote attackers to execute arbitrary code by manipulating the WANT/WANS argument in the /goform/WizardHandle POST request handler.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda AC6 router firmware version 15.03.05.16. The vulnerability, tracked as CVE-2026-4960, resides within the <code>fromWizardHandle</code> function of the <code>/goform/WizardHandle</code> component, which handles POST requests. A remote attacker can exploit this vulnerability by sending a crafted POST request with a manipulated <code>WANT</code> or <code>WANS</code> argument, leading to arbitrary code execution on the device. Public exploit code is available, increasing the risk of widespread exploitation. This vulnerability poses a significant threat, potentially allowing attackers to gain complete control over vulnerable routers and compromise connected networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda AC6 router running firmware version 15.03.05.16.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/goform/WizardHandle</code> endpoint.</li>
<li>Within the POST request, the attacker manipulates the <code>WANT</code> or <code>WANS</code> argument to inject a payload exceeding the buffer size.</li>
<li>The router processes the POST request, passing the attacker-controlled input to the vulnerable <code>fromWizardHandle</code> function.</li>
<li>The overflow occurs when the <code>fromWizardHandle</code> function copies the attacker-supplied data into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>The injected payload overwrites adjacent memory locations on the stack, including the return address.</li>
<li>When the <code>fromWizardHandle</code> function returns, it jumps to the attacker-controlled address.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the affected Tenda AC6 router. This can lead to a variety of malicious outcomes, including network hijacking, DNS poisoning, interception of network traffic, deployment of malware, and the creation of botnets. Given the widespread use of Tenda routers in home and small business networks, a large number of devices are potentially vulnerable. The CVSS v3.1 score of 8.8 reflects the high severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-4960.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/WizardHandle</code> with abnormally long <code>WANT</code> or <code>WANS</code> parameters using the Sigma rule provided below.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect exploit attempts targeting the <code>/goform/WizardHandle</code> endpoint.</li>
<li>Restrict access to the router&rsquo;s web interface from the public internet where possible to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4960</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item></channel></rss>