<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-7034 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-7034/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-7034/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda FH1202 Stack-Based Buffer Overflow Vulnerability (CVE-2026-7034)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-fh1202-bo/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-fh1202-bo/</guid><description>A stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically in the WrlExtraSet function, allowing remote attackers to execute arbitrary code by manipulating the 'Go' argument in a request to /goform/WrlExtraSet.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-7034, has been discovered in Tenda FH1202 version 1.2.0.14(408). The vulnerability resides within the <code>WrlExtraSet</code> function of the <code>/goform/WrlExtraSet</code> component, which is part of the device&rsquo;s <code>httpd</code> server. A remote attacker can exploit this vulnerability by crafting a malicious HTTP request that manipulates the <code>Go</code> argument, leading to arbitrary code execution on the affected device. The exploit for this vulnerability has been made public, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to users of the Tenda FH1202 router as it allows for complete compromise of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda FH1202 router exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlExtraSet</code> endpoint.</li>
<li>The crafted request includes a <code>Go</code> parameter with a payload exceeding the expected buffer size, triggering the stack-based buffer overflow.</li>
<li>The overflow overwrites critical return addresses on the stack.</li>
<li>The overwritten return address is redirected to malicious code injected by the attacker within the overflowed buffer.</li>
<li>The injected code executes with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains complete control of the device, potentially allowing for the installation of malware, modification of router settings, or interception of network traffic.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the Tenda FH1202 router. This can lead to a variety of malicious activities, including installing persistent backdoors, modifying DNS settings to redirect traffic, or using the compromised device as part of a botnet. The lack of required authentication for exploitation increases the severity, making it easily exploitable. While the exact number of affected devices is unknown, the widespread use of Tenda routers suggests a potentially large number of vulnerable targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/WrlExtraSet</code> with unusually long <code>Go</code> parameter values to detect potential exploitation attempts. Reference the Sigma rule <code>Detect Suspicious WrlExtraSet Requests</code>.</li>
<li>Implement rate limiting for requests to the <code>/goform/WrlExtraSet</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Consider blocking or alerting on requests to <code>/goform/WrlExtraSet</code> originating from outside the expected user base (e.g., requests originating from outside the country where the organization operates).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7034</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item></channel></rss>