<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6122 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6122/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 12 Apr 2026 08:16:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6122/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-overflow/</link><pubDate>Sun, 12 Apr 2026 08:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-overflow/</guid><description>Tenda F451 router version 1.0.0.7 is vulnerable to a stack-based buffer overflow in the frmL7ProtForm function, enabling remote attackers to execute arbitrary code by manipulating the 'page' argument.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda F451 router version 1.0.0.7. The vulnerability resides within the <code>frmL7ProtForm</code> function of the <code>/goform/L7Prot</code> component, specifically within the <code>httpd</code> service. A remote attacker can exploit this flaw by crafting a malicious request targeting the <code>page</code> argument. Successful exploitation allows the attacker to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to affected devices, potentially leading to full device compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F451 router running firmware version 1.0.0.7.</li>
<li>Attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/L7Prot</code> endpoint.</li>
<li>The malicious request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>frmL7ProtForm</code> function.</li>
<li>The <code>httpd</code> service processes the request without proper bounds checking on the <code>page</code> argument.</li>
<li>The oversized payload overflows the stack buffer during the execution of the <code>frmL7ProtForm</code> function.</li>
<li>The buffer overflow overwrites adjacent memory regions on the stack, including the return address.</li>
<li>The attacker-controlled return address redirects execution to attacker-supplied code or a return-oriented programming (ROP) chain.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F451 router. This can lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the device as a bot in a botnet. Given the availability of public exploits, vulnerable devices are at high risk of compromise. The number of potentially affected devices is substantial, as the Tenda F451 is a widely used router model.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/L7Prot</code> with unusually long <code>page</code> parameters, deploying the Sigma rule <code>Detect Tenda F451 Buffer Overflow Attempt</code> to identify potential exploitation attempts.</li>
<li>Since no patch is available, consider replacing the Tenda F451 1.0.0.7 with a more secure router or firewall solution.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other network devices.</li>
<li>Disable remote administration access to the router to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6122</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item></channel></rss>