{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-5021/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["cve-2026-5021","buffer-overflow","router"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA stack-based buffer overflow vulnerability, identified as CVE-2026-5021, has been discovered in Tenda F453 router version 1.0.0.3. This vulnerability resides within the \u003ccode\u003efromPPTPUserSetting\u003c/code\u003e function of the \u003ccode\u003e/goform/PPTPUserSetting\u003c/code\u003e component, specifically in the \u003ccode\u003ehttpd\u003c/code\u003e process. The vulnerability can be triggered by manipulating the \u003ccode\u003edelno\u003c/code\u003e argument. Successful exploitation allows remote attackers to potentially execute arbitrary code on the affected device. Publicly available exploit code…\u003c/p\u003e\n","date_modified":"2026-03-29T02:16:17Z","date_published":"2026-03-29T02:16:17Z","id":"/briefs/2026-03-tenda-f453-overflow/","summary":"A stack-based buffer overflow vulnerability in Tenda F453 1.0.0.3 allows a remote attacker to execute arbitrary code by manipulating the 'delno' argument in the fromPPTPUserSetting function of the /goform/PPTPUserSetting component's httpd process.","title":"Tenda F453 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5021)","url":"https://feed.craftedsignal.io/briefs/2026-03-tenda-f453-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-5021","version":"https://jsonfeed.org/version/1.1"}