<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5684 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5684/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 22:16:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5684/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 22:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in the Tenda CX12L router (version 16.03.53.12) due to improper handling of the 'page' argument in the 'fromwebExcptypemanFilter' function, potentially allowing attackers with local network access to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda CX12L routers running firmware version 16.03.53.12. The vulnerability resides within the <code>fromwebExcptypemanFilter</code> function in the <code>/goform/webExcptypemanFilter</code> file.  An attacker with local network access can exploit this flaw by manipulating the <code>page</code> argument passed to this function, leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-5684, has a CVSS v3.1 score of 8.0, indicating a high severity. Public exploits for this vulnerability are available, making it crucial for network administrators to address this issue promptly. Successful exploitation could allow an attacker to gain complete control of the router, potentially leading to data theft, network compromise, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the local network where the Tenda CX12L router is located.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/webExcptypemanFilter</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>fromwebExcptypemanFilter</code> function.</li>
<li>The router processes the HTTP request and passes the overly long <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromwebExcptypemanFilter</code> function attempts to write the contents of the <code>page</code> argument into a fixed-size buffer on the stack.</li>
<li>Due to the excessive length of the <code>page</code> argument, the buffer overflows, overwriting adjacent memory regions on the stack.</li>
<li>The attacker leverages the buffer overflow to overwrite the return address on the stack with the address of malicious code or a ROP chain.</li>
<li>When the <code>fromwebExcptypemanFilter</code> function returns, control is transferred to the attacker-controlled code, allowing for arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5684 allows an attacker with local network access to gain complete control of the affected Tenda CX12L router. This can lead to a variety of malicious activities, including unauthorized access to network traffic, modification of router settings, deployment of malicious firmware, and use of the compromised router as a botnet node. Given the availability of public exploits, organizations using this router model are at significant risk. The number of potential victims is dependent on the number of unpatched Tenda CX12L devices deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor webserver logs for HTTP requests targeting the <code>/goform/webExcptypemanFilter</code> endpoint with abnormally long <code>page</code> parameters to detect potential exploitation attempts. (Log Source: webserver, Rule: &ldquo;Detect Tenda CX12L Web Request with Long Page Parameter&rdquo;)</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda CX12L Stack Buffer Overflow Attempt&rdquo; to identify suspicious process creations following a potential exploit.</li>
<li>Review and restrict local network access to the Tenda CX12L router to reduce the attack surface, as the exploit requires local network access.</li>
<li>Contact Tenda for a security patch or firmware update to address CVE-2026-5684.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-5684</category></item></channel></rss>