<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6194 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6194/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6194/feed.xml" rel="self" type="application/rss+xml"/><item><title>Totolink A3002MU Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-a3002mu-bo/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-a3002mu-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6194) exists in the Totolink A3002MU B20211125.1046 router firmware, specifically affecting the `/boafrm/formWlanSetup` component's HTTP request handler, which allows remote attackers to execute arbitrary code by manipulating the `wan-url` argument.</description><content:encoded><![CDATA[<p>CVE-2026-6194 describes a stack-based buffer overflow vulnerability present in Totolink A3002MU router firmware version B20211125.1046. The vulnerability resides within the HTTP Request Handler, specifically in the <code>sub_410188</code> function of the <code>/boafrm/formWlanSetup</code> file. A remote attacker can exploit this vulnerability by crafting a malicious HTTP request that manipulates the <code>wan-url</code> argument, leading to arbitrary code execution on the device. Publicly available exploit code increases the likelihood of exploitation. Successful exploitation allows an attacker to compromise the device and potentially gain control of the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A3002MU router running firmware B20211125.1046.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/boafrm/formWlanSetup</code> endpoint.</li>
<li>The crafted request includes a <code>wan-url</code> argument with a payload exceeding the buffer size allocated for it in the <code>sub_410188</code> function.</li>
<li>The HTTP Request Handler processes the request and calls the vulnerable <code>sub_410188</code> function.</li>
<li>Due to insufficient bounds checking, the oversized <code>wan-url</code> argument overflows the stack buffer.</li>
<li>The attacker overwrites critical data on the stack, including the return address.</li>
<li>Upon returning from the <code>sub_410188</code> function, execution is redirected to an attacker-controlled address.</li>
<li>The attacker executes arbitrary code, potentially gaining full control of the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6194 can lead to complete compromise of the affected Totolink A3002MU router. This allows attackers to eavesdrop on network traffic, modify DNS settings, inject malicious code into web pages served to connected clients, or use the compromised router as a botnet node. Given the widespread use of these routers, a large number of devices could be at risk, potentially impacting home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/boafrm/formWlanSetup</code> with unusually long <code>wan-url</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Suspicious WAN-URL Parameter Length&rdquo;).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect and alert on potential exploitation attempts.</li>
<li>If possible, block requests matching the patterns identified in the Sigma rules at your network perimeter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6194</category><category>buffer-overflow</category><category>totolink</category><category>router</category></item></channel></rss>