<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6121 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6121/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 12 Apr 2026 08:16:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6121/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda F451 Stack-Based Buffer Overflow Vulnerability (CVE-2026-6121)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-overflow/</link><pubDate>Sun, 12 Apr 2026 08:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6121) exists in the WrlclientSet function of the /goform/WrlclientSet file in the httpd component of Tenda F451 version 1.0.0.7, allowing remote attackers to execute arbitrary code by manipulating the GO argument.</description><content:encoded><![CDATA[<p>CVE-2026-6121 is a stack-based buffer overflow vulnerability affecting Tenda F451 router version 1.0.0.7. The vulnerability resides within the <code>WrlclientSet</code> function located in the <code>/goform/WrlclientSet</code> file of the <code>httpd</code> component. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the affected router, specifically manipulating the <code>GO</code> argument. Due to insufficient bounds checking on the <code>GO</code> argument&rsquo;s size when passed to the <code>WrlclientSet</code> function, an attacker can write beyond the allocated buffer on the stack, potentially leading to arbitrary code execution. Publicly available exploits exist, increasing the risk of widespread exploitation. Routers that are accessible from the internet are at highest risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router version 1.0.0.7 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>Within the HTTP POST request, the attacker includes the <code>GO</code> argument, filling it with a payload exceeding the buffer size allocated for it within the <code>WrlclientSet</code> function.</li>
<li>The <code>httpd</code> component of the Tenda F451 router receives the HTTP request and passes the <code>GO</code> argument to the vulnerable <code>WrlclientSet</code> function.</li>
<li>Due to the buffer overflow, the attacker&rsquo;s payload overwrites adjacent memory locations on the stack.</li>
<li>The attacker&rsquo;s payload overwrites the return address on the stack, redirecting execution flow to attacker-controlled code.</li>
<li>The attacker-controlled code executes with the privileges of the <code>httpd</code> process, allowing the attacker to perform actions such as modifying router configuration, executing system commands, or establishing a reverse shell.</li>
<li>The attacker gains persistent access to the router and potentially the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6121 can lead to complete compromise of the affected Tenda F451 router. An attacker can gain unauthorized access to the device&rsquo;s configuration, potentially modifying DNS settings, firewall rules, or other critical parameters. This can lead to redirection of user traffic, denial-of-service attacks, or the establishment of a foothold within the targeted network for further malicious activities. Given the ease of exploitation due to the publicly available exploit code, a large number of Tenda F451 routers could be compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/WrlclientSet</code> with abnormally long <code>GO</code> parameter values to detect potential exploitation attempts (see Sigma rule below and enable webserver logging).</li>
<li>Implement rate limiting for requests to the <code>/goform/WrlclientSet</code> endpoint to mitigate potential brute-force exploitation attempts (configure your firewall or WAF).</li>
<li>Upgrade to a patched firmware version when available or replace the affected devices, if the vendor does not provide a fix.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6121</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item></channel></rss>