<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6120 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6120/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 12 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6120/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</link><pubDate>Sun, 12 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</guid><description>A remote stack-based buffer overflow vulnerability exists in the fromDhcpListClient function of the /goform/DhcpListClient component (httpd) within Tenda F451 firmware version 1.0.0.7, triggered by manipulating the 'page' argument, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda F451 router firmware version 1.0.0.7. The vulnerability resides in the <code>fromDhcpListClient</code> function within the <code>/goform/DhcpListClient</code> component&rsquo;s httpd service. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious <code>page</code> argument. This can lead to arbitrary code execution on the device. Given the public availability of the exploit (CVE-2026-6120), Tenda F451 routers are at immediate risk of compromise if not properly secured. This vulnerability poses a significant threat due to the widespread use of Tenda routers in home and small office environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router running vulnerable firmware version 1.0.0.7.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/DhcpListClient</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a string exceeding the buffer size allocated for it in the <code>fromDhcpListClient</code> function.</li>
<li>The <code>httpd</code> service on the router receives the malicious request and passes the <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromDhcpListClient</code> function attempts to copy the oversized <code>page</code> argument into a fixed-size buffer on the stack, causing a buffer overflow.</li>
<li>The overflow overwrites adjacent stack memory, including the return address of the function.</li>
<li>The attacker controls the overwritten return address, redirecting execution to attacker-controlled code or a ROP chain.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete device compromise and network access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda F451 router. This allows attackers to control the device, intercept network traffic, change DNS settings, inject malicious scripts into web pages served to connected devices, or use the router as a pivot point for further attacks within the network. This vulnerability affects all users of the Tenda F451 router running firmware version 1.0.0.7, potentially impacting thousands of devices globally. Given the high CVSS score of 8.8, the risk is substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the <code>/goform/DhcpListClient</code> endpoint, especially those with unusually long <code>page</code> parameters (refer to the rule <code>Tenda F451 Suspicious URI Length</code>).</li>
<li>Inspect network traffic for abnormal patterns related to compromised routers (unusual DNS requests, connections to known malicious IPs).</li>
<li>Implement rate limiting and input validation on web server endpoints where possible to mitigate buffer overflow attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-6120, although patches may not be available.</li>
<li>Consider deploying network intrusion detection systems (NIDS) to identify and block exploitation attempts (refer to the <code>Tenda F451 Buffer Overflow Attempt</code> rule).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-6120</category><category>iot</category></item></channel></rss>