<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Router — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/router/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 10:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/router/feed.xml" rel="self" type="application/rss+xml"/><item><title>Totolink N300RH Buffer Overflow Vulnerability in setWanConfig</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setWanConfig</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. An attacker can exploit this vulnerability by manipulating the <code>priDns</code> argument in a crafted POST request. The vulnerability allows for remote exploitation, meaning an attacker does not need local access to the device. Public exploits for this vulnerability are already available, increasing the risk of exploitation. This vulnerability was published on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>priDns</code> argument with a value exceeding the buffer size.</li>
<li>The <code>setWanConfig</code> function processes the <code>priDns</code> argument without proper bounds checking.</li>
<li>The oversized <code>priDns</code> value overwrites adjacent memory on the stack, potentially including control flow data.</li>
<li>The attacker gains control of the program execution flow by overwriting the return address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining a shell.</li>
<li>The attacker could then use the compromised router to perform lateral movement, exfiltrate data, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability can lead to complete compromise of the Totolink N300RH router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a pivot point to attack other devices on the network. Given that public exploits are available, a wide range of attackers could potentially exploit this vulnerability. The CVSS v3.1 base score is 8.8 (HIGH).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with abnormally long <code>priDns</code> values to detect potential exploitation attempts using the provided Sigma rule.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect and block malicious POST requests targeting <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>Contact Totolink for a security patch or firmware update to address CVE-2026-7749.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve-2026-7749</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability (CVE-2026-7750)</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH 3.2.4-B20220812 allowing remote attackers to execute arbitrary code by manipulating the mac_address argument in the setMacFilterRules function of the /cgi-bin/cstecgi.cgi POST request handler.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7750, affects Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setMacFilterRules</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. Attackers can exploit this flaw by sending a specially crafted POST request with an overly long <code>mac_address</code> parameter, triggering a buffer overflow. Successful exploitation allows for arbitrary code execution on the device. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread attacks. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>mac_address</code> parameter, injecting a string longer than the buffer allocated for it.</li>
<li>The <code>setMacFilterRules</code> function processes the POST request without proper bounds checking on the <code>mac_address</code> argument.</li>
<li>The overly long <code>mac_address</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow to attacker-controlled code.</li>
<li>The injected code executes with the privileges of the web server, allowing the attacker to execute arbitrary commands.</li>
<li>The attacker gains complete control over the router, potentially using it for further malicious activities such as network pivoting, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7750 allows a remote attacker to execute arbitrary code on the vulnerable Totolink N300RH device. This could lead to a complete compromise of the router, allowing the attacker to control network traffic, steal sensitive information, or use the router as a bot in a larger attack. Given the public availability of the exploit, a large number of unpatched devices could be vulnerable to automated attacks, potentially impacting thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Totolink to address CVE-2026-7750.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block suspicious POST requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint with excessively long <code>mac_address</code> parameters.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for unusual POST requests to <code>/cgi-bin/cstecgi.cgi</code>, focusing on requests with large <code>mac_address</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve</category><category>webserver</category></item><item><title>Totolink WA300 Buffer Overflow Vulnerability in UploadCustomModule</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-wa300-buffer-overflow/</link><pubDate>Mon, 04 May 2026 01:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-wa300-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in the UploadCustomModule function of the /cgi-bin/cstecgi.cgi file in the POST Request Handler component of Totolink WA300 version 5.2cu.7112_B20190227, which can be exploited by manipulating the File argument.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Totolink WA300 wireless router, specifically version 5.2cu.7112_B20190227. The vulnerability resides within the <code>UploadCustomModule</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file, a component of the POST Request Handler. The identified vulnerability allows a remote attacker to cause a buffer overflow through manipulation of the <code>File</code> argument within a crafted POST request. Public proof-of-concept exploit code is available, increasing the likelihood of exploitation. This vulnerability poses a significant risk, as successful exploitation could lead to arbitrary code execution, potentially allowing attackers to fully compromise affected devices. Defenders should prioritize detection and mitigation strategies to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Totolink WA300 device running firmware version 5.2cu.7112_B20190227.</li>
<li>Attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The POST request includes a <code>File</code> argument with a payload exceeding the buffer size allocated for the <code>UploadCustomModule</code> function.</li>
<li>The <code>UploadCustomModule</code> function processes the POST request without proper bounds checking on the <code>File</code> argument.</li>
<li>The oversized <code>File</code> argument overwrites adjacent memory regions, including potentially critical program data and control flow instructions.</li>
<li>The buffer overflow allows the attacker to inject and execute arbitrary code on the device.</li>
<li>The attacker gains remote shell access to the device with elevated privileges.</li>
<li>The attacker could then use the compromised device to pivot into the internal network or cause a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability can lead to complete compromise of the affected Totolink WA300 device. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the device as a bot in a larger attack. Given the high CVSS score of 8.8, the impact is considered critical. Home and small business networks using the affected router model are at risk. The vulnerability allows for remote code execution, leading to significant potential for damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink WA300 UploadCustomModule Buffer Overflow Attempt</code> to detect malicious POST requests targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusually large <code>File</code> parameters, as indicated in the Sigma rule.</li>
<li>Apply any available firmware updates from Totolink to patch CVE-2026-7717 if they become available.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other internal network resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>remote-code-execution</category><category>router</category></item><item><title>Edimax BR-6208AC Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</guid><description>A buffer overflow vulnerability exists in Edimax BR-6208AC devices (&lt;= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-7685, has been identified in Edimax BR-6208AC routers up to version 1.02. The vulnerability resides within the <code>/goform/setWAN</code> file, specifically related to the <code>pptpDfGateway</code> argument. Successful exploitation of this flaw could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition. Publicly available exploits exist, increasing the risk of widespread exploitation. The vendor was notified but has not responded. Given the ease of exploitation and the potential for significant impact, this vulnerability poses a critical threat to affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Edimax BR-6208AC router with firmware version 1.02 or earlier exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>pptpDfGateway</code> argument, injecting a payload exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s web server processes the malicious request without proper input validation on the size of the <code>pptpDfGateway</code> argument.</li>
<li>The oversized payload overwrites adjacent memory regions on the stack, potentially including return addresses or other critical data.</li>
<li>When the function attempts to return, it jumps to an address controlled by the attacker, leading to arbitrary code execution.</li>
<li>The attacker executes commands to gain control of the device, potentially installing malware or modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Edimax BR-6208AC router. An attacker could leverage this access to perform a variety of malicious activities, including eavesdropping on network traffic, injecting malicious code into web pages served by the router, or using the router as a bot in a larger botnet. Given the availability of public exploits, unpatched devices are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Edimax BR-6208AC setWAN Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for POST requests to <code>/goform/setWAN</code> containing unusually long <code>pptpDfGateway</code> parameters, as detected by the Sigma rule <code>Detect Long pptpDfGateway Parameter</code>.</li>
<li>Apply appropriate network segmentation to limit the blast radius of compromised devices and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7685</category><category>router</category><category>webserver</category></item><item><title>Totolink NR1800X Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-rce/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-rce/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-7546) in the Totolink NR1800X router allows remote attackers to achieve arbitrary code execution by sending a crafted HTTP request with a manipulated Host header to the vulnerable lighttpd component.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-7546, affects Totolink NR1800X routers running firmware version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>find_host_ip</code> function of the lighttpd web server component. By exploiting this flaw, a remote, unauthenticated attacker can trigger a stack-based buffer overflow through manipulation of the Host argument in an HTTP request. The publicly disclosed exploit allows attackers to potentially gain complete control of the device. This vulnerability poses a significant risk to home and small business networks utilizing the affected Totolink router model, as successful exploitation leads to arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X router running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker crafts a malicious HTTP request targeting the router&rsquo;s web interface.</li>
<li>The crafted request includes a <code>Host</code> header with a string exceeding the buffer size allocated in the <code>find_host_ip</code> function within the <code>lighttpd</code> component.</li>
<li>The router&rsquo;s <code>lighttpd</code> server processes the HTTP request and passes the <code>Host</code> header value to the vulnerable function.</li>
<li>The <code>find_host_ip</code> function attempts to store the oversized <code>Host</code> value in a stack-allocated buffer.</li>
<li>A stack-based buffer overflow occurs due to the insufficient buffer size.</li>
<li>The overflow overwrites adjacent memory on the stack, potentially including the return address.</li>
<li>The attacker gains arbitrary code execution on the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7546 allows a remote attacker to execute arbitrary code on the vulnerable Totolink NR1800X device. This can lead to complete control of the router, allowing the attacker to modify router settings, intercept network traffic, or use the compromised router as a pivot point for further attacks within the network. Given the nature of stack-based buffer overflows, the attacker can potentially install persistent backdoors or malware. This presents a significant risk to users, potentially exposing sensitive data and infrastructure to unauthorized access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches released by Totolink to remediate CVE-2026-7546.</li>
<li>Monitor network traffic for suspicious HTTP requests targeting Totolink routers, specifically looking for abnormally long Host headers with the Sigma rule &ldquo;Detect Suspiciously Long Host Header&rdquo;.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Review and harden router configurations, including disabling remote administration if not required.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>remote code execution</category><category>buffer overflow</category><category>router</category></item><item><title>Totolink NR1800X Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</guid><description>A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-7548, affects Totolink NR1800X router version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>sub_41A68C</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>setUssd</code> argument, a remote attacker can inject arbitrary commands into the system. Publicly available exploit code makes exploitation easier. This vulnerability poses a significant risk as it allows unauthenticated remote attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X device running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request includes the <code>setUssd</code> argument with a malicious payload designed to inject a command.</li>
<li>The <code>sub_41A68C</code> function processes the <code>setUssd</code> argument without proper sanitization.</li>
<li>The injected command is executed by the system with the privileges of the web server process.</li>
<li>The attacker gains initial access and can execute arbitrary commands on the device.</li>
<li>The attacker may then use the command execution to escalate privileges, install malware, or pivot to other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the affected Totolink NR1800X router. This could lead to complete compromise of the device, allowing the attacker to control network traffic, modify router settings, or use the router as a pivot point to attack other devices on the network. Given the wide usage of Totolink routers, a large number of devices could be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> containing suspicious characters or command injection attempts in the <code>setUssd</code> parameter, using the Sigma rule provided below.</li>
<li>Implement rate limiting on the <code>/cgi-bin/cstecgi.cgi</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches provided by Totolink to address the CVE-2026-7548 vulnerability.</li>
<li>Deploy the Sigma rule to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>network</category></item><item><title>UTT HiPER 1200GW Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-utt-hiper-buffer-overflow/</link><pubDate>Fri, 01 May 2026 00:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-utt-hiper-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in UTT HiPER 1200GW devices up to version 2.5.3-170306, stemming from manipulation of the `strcpy` function in the `/goform/formRemoteControl` file, which allows remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in UTT HiPER 1200GW devices with firmware versions up to 2.5.3-170306. The flaw resides within the <code>strcpy</code> function of the <code>/goform/formRemoteControl</code> file, which handles remote control functionalities. A remote attacker can exploit this vulnerability by sending a specially crafted request to trigger the buffer overflow, potentially leading to arbitrary code execution on the affected device. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations using the affected UTT HiPER 1200GW devices, as it could allow attackers to gain unauthorized access and control over the device and potentially the network it is connected to.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable UTT HiPER 1200GW device exposed to the internet.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/goform/formRemoteControl</code> endpoint.</li>
<li>The malicious request includes a payload designed to overflow the buffer when processed by the <code>strcpy</code> function.</li>
<li>The vulnerable <code>strcpy</code> function within <code>/goform/formRemoteControl</code> copies the attacker-controlled data without proper bounds checking.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>The attacker leverages the overflow to inject and execute arbitrary code on the device.</li>
<li>The attacker gains control of the device, potentially escalating privileges.</li>
<li>The attacker uses the compromised device to pivot to other systems on the network, exfiltrate sensitive data, or cause further damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to complete compromise of the affected UTT HiPER 1200GW device. Attackers could gain unauthorized access to sensitive data, disrupt device functionality, or use the device as a foothold for further attacks within the network. Given that public exploits are available, the risk of widespread exploitation is high. While the exact number of affected devices is unknown, organizations using UTT HiPER 1200GW devices should take immediate action to mitigate this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates from UTT to address the buffer overflow vulnerability in UTT HiPER 1200GW devices.</li>
<li>Monitor network traffic for suspicious requests targeting the <code>/goform/formRemoteControl</code> endpoint, and deploy the Sigma rule <code>Detect Suspicious Requests to FormRemoteControl</code> to identify potentially malicious activity.</li>
<li>Implement input validation and sanitization measures to prevent buffer overflows in web applications.</li>
<li>Consider network segmentation to limit the impact of a compromised device on other systems within the network.</li>
<li>Review and restrict access to the device&rsquo;s web interface to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>iot</category><category>router</category><category>cve</category></item><item><title>Tenda 4G300 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</link><pubDate>Thu, 30 Apr 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</guid><description>A remote stack-based buffer overflow vulnerability exists in the Tenda 4G300 router, version US_4G300V1.0Mt_V1.01.42_CN_TDC01, allowing an attacker to potentially execute arbitrary code by manipulating the 'page' argument to the sub_427C3C function in the /goform/SafeMacFilter file.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda 4G300 routers, specifically version US_4G300V1.0Mt_V1.01.42_CN_TDC01. The vulnerability resides within the <code>sub_427C3C</code> function located in the <code>/goform/SafeMacFilter</code> file. An attacker can exploit this flaw by manipulating the <code>page</code> argument in a crafted request, leading to a buffer overflow and potentially allowing for arbitrary code execution on the affected device. The vulnerability, identified as CVE-2026-7470, poses a significant risk as remote exploitation is possible, and a proof-of-concept exploit is publicly available, increasing the likelihood of malicious actors leveraging this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda 4G300 router running the vulnerable firmware version US_4G300V1.0Mt_V1.01.42_CN_TDC01.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeMacFilter</code> endpoint.</li>
<li>The crafted request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>sub_427C3C</code> function.</li>
<li>The router processes the HTTP request, passing the oversized <code>page</code> argument to the vulnerable function.</li>
<li>The <code>sub_427C3C</code> function attempts to write the oversized data into a stack-based buffer, causing a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory on the stack, including the return address.</li>
<li>The attacker redirects execution flow to a malicious code payload injected into the request or elsewhere in memory.</li>
<li>The injected code executes with the privileges of the router process, potentially allowing the attacker to gain full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda 4G300 router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a launching point for further attacks against other devices on the network or the internet. Given the widespread use of these routers in homes and small businesses, a successful attack could impact a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/goform/SafeMacFilter</code> with abnormally long <code>page</code> parameters. Use the provided Sigma rule to detect suspicious activity.</li>
<li>Implement rate limiting on the <code>/goform/SafeMacFilter</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7470.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>cve-2026-7470</category></item><item><title>D-Link DIR-825M Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</link><pubDate>Tue, 28 Apr 2026 15:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</guid><description>D-Link DIR-825M version 1.1.12 is vulnerable to a buffer overflow via manipulation of the submit-url argument in the /boafrm/formWanConfigSetup file's sub_414BA8 function, allowing a remote attacker to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability exists in D-Link DIR-825M router version 1.1.12. The vulnerability is located within the <code>sub_414BA8</code> function of the <code>/boafrm/formWanConfigSetup</code> file. An attacker can exploit this flaw by manipulating the <code>submit-url</code> argument, leading to arbitrary code execution on the device. This vulnerability is remotely exploitable, and a proof-of-concept exploit is publicly available, increasing the risk of widespread attacks. Exploitation does not require authentication by default, and could allow an attacker to gain complete control over the device. This poses a significant threat to home and small business networks relying on this router model.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-825M router running firmware version 1.1.12.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
<li>The attacker includes the <code>submit-url</code> argument in the POST request, injecting a buffer overflow payload.</li>
<li>The crafted payload overflows the buffer in the <code>sub_414BA8</code> function during the processing of the <code>submit-url</code> argument.</li>
<li>The buffer overflow overwrites critical memory regions, including the return address.</li>
<li>When the <code>sub_414BA8</code> function returns, control is redirected to the attacker-controlled address.</li>
<li>The attacker&rsquo;s payload executes arbitrary code, potentially downloading and executing a secondary payload.</li>
<li>The attacker gains remote shell access to the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the D-Link DIR-825M router. This can lead to complete compromise of the device, allowing the attacker to eavesdrop on network traffic, modify router settings, or use the router as a botnet node for further malicious activities. Given the widespread use of D-Link routers in home and small business networks, a successful attack could compromise a large number of devices and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from D-Link to patch CVE-2026-7289.</li>
<li>Deploy the following Sigma rule to detect suspicious POST requests to <code>/boafrm/formWanConfigSetup</code> with overly long <code>submit-url</code> parameters.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>dlink</category><category>cve</category></item><item><title>Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</guid><description>A stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda HG3 version 2.0. The vulnerability exists within the <code>formUploadConfig</code> function of the <code>/boaform/formIPv6Routing</code> file. A remote attacker can exploit this by manipulating the <code>destNet</code> argument, potentially leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-7151, has a publicly available exploit, increasing the risk of exploitation. This poses a significant threat to users of Tenda HG3 v2.0 routers, potentially allowing attackers to gain unauthorized access and control over the device. The CVSS v3.1 score is rated as 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda HG3 v2.0 router with default or known credentials, or no authentication at all.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/boaform/formIPv6Routing</code>.</li>
<li>The request targets the <code>formUploadConfig</code> function.</li>
<li>The <code>destNet</code> argument within the HTTP POST data is manipulated with a string exceeding the buffer size.</li>
<li>The <code>formUploadConfig</code> function processes the oversized <code>destNet</code> argument without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions on the stack.</li>
<li>The attacker gains arbitrary code execution on the device by overwriting the return address or other critical data on the stack.</li>
<li>The attacker can then leverage this to gain full control of the device, potentially modifying settings, injecting malware, or using it as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda HG3 v2.0 router. This could lead to complete compromise of the device, allowing the attacker to monitor network traffic, change router settings, or use the device as a launchpad for further attacks against other devices on the network. Given the potential for widespread exploitation due to the publicly available exploit, a large number of Tenda HG3 v2.0 users are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/boaform/formIPv6Routing</code> with excessively long <code>destNet</code> parameters to detect potential exploit attempts (see example Sigma rule below).</li>
<li>Implement rate limiting for requests to <code>/boaform/formIPv6Routing</code> to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches or firmware updates from Tenda to address CVE-2026-7151 on vulnerable HG3 2.0 devices.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting the <code>destNet</code> parameter in <code>/boaform/formIPv6Routing</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7151</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-rce/</link><pubDate>Tue, 28 Apr 2026 09:17:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-rce/</guid><description>Totolink A8000RU version 7.1cu.643_b20200521 is vulnerable to OS command injection via manipulation of the `wifiOff` argument in the `setWiFiBasicCfg` function of the `/cgi-bin/cstecgi.cgi` CGI handler, allowing a remote attacker to execute arbitrary commands on the system.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7241, has been identified in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This vulnerability resides within the CGI Handler component, specifically in the <code>setWiFiBasicCfg</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. Successful exploitation allows a remote attacker to inject and execute arbitrary operating system commands by manipulating the <code>wifiOff</code> argument. The vulnerability has been publicly disclosed, increasing the risk of exploitation. This poses a significant threat to users of the affected router model, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Totolink A8000RU router running firmware version 7.1cu.643_b20200521.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request targets the <code>setWiFiBasicCfg</code> function.</li>
<li>The attacker injects malicious OS commands into the <code>wifiOff</code> argument of the HTTP request.</li>
<li>The CGI handler processes the request without proper sanitization of the <code>wifiOff</code> argument.</li>
<li>The injected OS commands are executed by the system with the privileges of the web server.</li>
<li>The attacker gains remote shell access or performs other malicious actions, such as modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected Totolink A8000RU router. This can lead to complete compromise of the device, potentially enabling the attacker to eavesdrop on network traffic, modify router configuration, or use the router as a node in a botnet. Given the widespread use of Totolink routers, a successful attack could impact numerous home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Totolink A8000RU Command Injection Attempt&rdquo; to your SIEM to identify exploitation attempts targeting the vulnerable endpoint.</li>
<li>Apply the Sigma rule &ldquo;Detect Suspicious CGI Request Arguments&rdquo; to identify unusual commands in cgi requests.</li>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> with suspicious characters or commands in the <code>wifiOff</code> parameter, as this is the attack vector described in CVE-2026-7241.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7241</category><category>command-injection</category><category>router</category></item><item><title>D-Link DI-8100 Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</link><pubDate>Tue, 28 Apr 2026 09:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</guid><description>A buffer overflow vulnerability in the D-Link DI-8100 router allows remote attackers to execute arbitrary code by manipulating the 'fn' argument in the tgfile_htm function of the CGI endpoint.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7248, affects the D-Link DI-8100 router, specifically version 16.07.26A1. The vulnerability resides within the <code>tgfile_htm</code> function of the <code>tgfile.htm</code> file, a component of the CGI endpoint. By crafting a malicious request targeting the <code>fn</code> argument, a remote, unauthenticated attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. This vulnerability is particularly concerning as a proof-of-concept exploit has been publicly released, increasing the likelihood of exploitation. Routers are often targeted due to their exposure to the internet and the potential to compromise entire networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DI-8100 router running firmware version 16.07.26A1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>tgfile.htm</code> CGI endpoint.</li>
<li>The malicious request includes an overly long string in the <code>fn</code> argument.</li>
<li>The router&rsquo;s web server processes the request and passes the <code>fn</code> argument to the <code>tgfile_htm</code> function.</li>
<li>The <code>tgfile_htm</code> function fails to properly validate the length of the <code>fn</code> argument.</li>
<li>A buffer overflow occurs when the overly long <code>fn</code> argument is copied into a fixed-size buffer.</li>
<li>The buffer overflow overwrites adjacent memory, potentially including return addresses or other critical data.</li>
<li>The attacker gains arbitrary code execution on the router, potentially allowing them to take full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to remotely execute arbitrary code on the D-Link DI-8100 router. This could lead to a complete compromise of the device, allowing the attacker to intercept network traffic, modify router settings, or use the router as a launchpad for further attacks against other devices on the network. Given the public availability of an exploit, widespread exploitation is possible, potentially affecting numerous home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for abnormally long <code>fn</code> parameters in requests to <code>/tgfile.htm</code> using the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement rate limiting on HTTP requests to the router&rsquo;s web interface to mitigate brute-force exploitation attempts.</li>
<li>Since the source material only identifies a vulnerability, without a patch, consider replacing the affected device.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7248</category><category>buffer-overflow</category><category>d-link</category><category>router</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7240)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-cmd-injection/</link><pubDate>Tue, 28 Apr 2026 08:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-cmd-injection/</guid><description>CVE-2026-7240 is a critical OS command injection vulnerability in the Totolink A8000RU router that allows remote attackers to execute arbitrary commands by manipulating the 'User' argument in the 'setVpnAccountCfg' function.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7240, has been identified in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This flaw resides within the CGI Handler component, specifically in the <code>setVpnAccountCfg</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By exploiting this vulnerability, a remote attacker can inject arbitrary operating system commands by manipulating the <code>User</code> argument. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat as it allows complete control of the affected device, potentially leading to network compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Totolink A8000RU router running firmware version 7.1cu.643_b20200521 accessible via the web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The crafted request includes the <code>setVpnAccountCfg</code> function call with a payload injected into the <code>User</code> argument. The payload contains OS commands to be executed on the router.</li>
<li>The router&rsquo;s CGI Handler processes the request without proper sanitization of the <code>User</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the web server process.</li>
<li>The attacker gains remote shell access to the router.</li>
<li>The attacker leverages the compromised router to pivot within the network, potentially accessing sensitive data or other internal systems.</li>
<li>The attacker could modify the router&rsquo;s configuration, intercept network traffic, or use it as a launching point for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7240 allows a remote, unauthenticated attacker to execute arbitrary commands on the affected Totolink A8000RU router. This could lead to a complete compromise of the device, potentially exposing sensitive information, enabling unauthorized network access, and facilitating further attacks within the network. Given the ease of exploitation and the availability of public exploits, organizations using this router model are at high risk of experiencing significant security breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink A8000RU Command Injection Attempt</code> to identify exploitation attempts against vulnerable Totolink routers. Enable webserver logging to capture the necessary request data.</li>
<li>Apply the Sigma rule <code>Detect Totolink A8000RU Malicious User Agent</code> to detect potential exploit attempts based on modified User-Agent headers.</li>
<li>Monitor webserver logs for requests to <code>/cgi-bin/cstecgi.cgi</code> containing suspicious characters or command sequences in the <code>cs-uri-query</code> field, indicative of command injection attempts.</li>
<li>Given the public availability of exploit code, organizations using the Totolink A8000RU 7.1cu.643_b20200521 are advised to replace the device if a patch is not available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7240</category><category>command-injection</category><category>totolink</category><category>router</category><category>cgi</category></item><item><title>Totolink N300RT Buffer Overflow Vulnerability (CVE-2026-7219)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-n300rt-bo/</link><pubDate>Tue, 28 Apr 2026 04:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-n300rt-bo/</guid><description>A remote buffer overflow vulnerability exists in Totolink N300RT 3.4.0-B20250430 via manipulation of the 'entry_name' argument in the /boafrm/formIpQoS file, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7219, has been discovered in Totolink N300RT router firmware version 3.4.0-B20250430. The vulnerability resides within the <code>/boafrm/formIpQoS</code> file and is triggered by manipulating the <code>entry_name</code> argument. An attacker can exploit this flaw remotely to potentially execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to devices running the affected firmware, potentially allowing attackers to gain unauthorized access and control over the router.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Totolink N300RT device running firmware version 3.4.0-B20250430.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/boafrm/formIpQoS</code> file.</li>
<li>The crafted request includes a payload designed to overflow the buffer associated with the <code>entry_name</code> argument.</li>
<li>The router&rsquo;s web server processes the malicious request, leading to a buffer overflow condition.</li>
<li>The attacker overwrites adjacent memory regions, potentially including return addresses or other critical data.</li>
<li>Upon function return, the overwritten return address is used, diverting execution flow to attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution on the device.</li>
<li>The attacker can then use this access to modify router settings, intercept network traffic, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Totolink N300RT device. This could lead to complete compromise of the router, enabling attackers to monitor network traffic, change DNS settings, or use the device as part of a botnet. Given the number of Totolink N300RT devices deployed, this vulnerability could have a widespread impact, especially for home and small business users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests targeting <code>/boafrm/formIpQoS</code> with unusually long <code>entry_name</code> parameters to detect potential exploitation attempts. Implement the Sigma rule <code>Detect Suspicious Totolink FormIpQoS Requests</code>.</li>
<li>Apply firmware updates as soon as they are released by Totolink to patch CVE-2026-7219.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other devices on the network.</li>
<li>Consider using a web application firewall (WAF) to filter out malicious requests targeting the router&rsquo;s web interface and activate the <code>Detect Large POST Requests to Router Config Pages</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>iot</category><category>router</category><category>cve-2026-7219</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability (CVE-2026-7101)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</link><pubDate>Mon, 27 Apr 2026 09:19:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 version 1.0.0.5 allows remote attackers to execute arbitrary code via a crafted request to the fromWrlclientSet function in the /goform/WrlclientSet file of the httpd component.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7101, has been discovered in Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromWrlclientSet</code> function within the <code>/goform/WrlclientSet</code> file, which is part of the router&rsquo;s httpd component. Successful exploitation allows remote attackers to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to home and small business networks using the affected Tenda router model, potentially leading to complete device compromise and unauthorized network access. The vulnerability was published on 2026-04-27 and is tracked by VulDB.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda F456 router running firmware version 1.0.0.5.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>The crafted request includes an oversized payload designed to overflow the buffer in the <code>fromWrlclientSet</code> function.</li>
<li>The <code>httpd</code> process attempts to process the request without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions, including critical program data and execution pointers.</li>
<li>The attacker gains control of the program execution flow.</li>
<li>The attacker executes arbitrary code on the router, potentially including shell commands or custom malware.</li>
<li>The attacker achieves complete control of the router, potentially enabling network reconnaissance, data exfiltration, or further attacks on the local network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda F456 router. This can lead to complete device compromise, allowing the attacker to control network traffic, modify router settings, or use the compromised device as a pivot point for further attacks within the network. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploitation could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched firmware version if available from the vendor.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/goform/WrlclientSet</code> endpoint using the provided Sigma rule.</li>
<li>Implement an IPS rule to detect and block exploit attempts targeting CVE-2026-7101.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7101</category><category>buffer-overflow</category><category>router</category><category>tenda</category><category>remote-code-execution</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-bo/</link><pubDate>Mon, 27 Apr 2026 04:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-bo/</guid><description>A buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 in the `fromGstDhcpSetSer` function, allowing remote attackers to execute arbitrary code by manipulating the 'dips' argument via a crafted HTTP request to `/goform/GstDhcpSetSer`.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7081, affects Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromGstDhcpSetSer</code> function within the <code>/goform/GstDhcpSetSer</code> file, a component of the device&rsquo;s httpd service. Successful exploitation allows a remote attacker to execute arbitrary code on the device. Publicly available exploit code increases the risk of widespread exploitation. This vulnerability poses a significant threat as it can lead to complete compromise of the affected device, potentially allowing attackers to gain unauthorized access to the network, steal sensitive information, or use the device as part of a botnet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda F456 router (version 1.0.0.5) exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/GstDhcpSetSer</code> endpoint.</li>
<li>The HTTP request includes the <code>dips</code> argument, which is intentionally oversized to trigger the buffer overflow.</li>
<li>The vulnerable <code>fromGstDhcpSetSer</code> function processes the request without proper bounds checking.</li>
<li>The oversized <code>dips</code> argument overwrites adjacent memory regions on the stack.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address with an address pointing to attacker-controlled code.</li>
<li>The <code>fromGstDhcpSetSer</code> function returns, causing execution to jump to the attacker&rsquo;s code.</li>
<li>The attacker&rsquo;s code executes with the privileges of the httpd process, potentially leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F456 router. This can result in complete device compromise, including the ability to modify device settings, intercept network traffic, and potentially use the compromised device as a pivot point for further attacks within the network. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, making this a significant security concern.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/GstDhcpSetSer</code> with unusually long <code>dips</code> parameter values to detect potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule <code>Detect Tenda F456 Buffer Overflow Attempt</code> to identify malicious HTTP requests.</li>
<li>Since no patch is available, consider replacing the affected Tenda F456 routers (version 1.0.0.5) with more secure alternatives.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>router</category></item><item><title>Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)</title><link>https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</link><pubDate>Sun, 26 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</guid><description>CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.</description><content:encoded><![CDATA[<p>A command injection vulnerability, CVE-2026-6992, affects the Linksys MR9600 router, specifically version 2.0.6.206937. The vulnerability resides in the JNAP Action Handler component within the <code>/etc/init.d/run_central2.sh</code> script. Attackers can remotely exploit this flaw by manipulating the <code>pin</code> argument passed to the <code>BTRequestGetSmartConnectStatus</code> function. This allows for the execution of arbitrary operating system commands on the affected device. A public exploit is available, increasing the risk of exploitation. The vendor was notified but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the Linksys MR9600 router.</li>
<li>The request targets the JNAP Action Handler component, specifically the <code>/etc/init.d/run_central2.sh</code> script.</li>
<li>The <code>BTRequestGetSmartConnectStatus</code> function is invoked by the crafted request.</li>
<li>The attacker injects malicious OS commands within the <code>pin</code> argument of the <code>BTRequestGetSmartConnectStatus</code> function.</li>
<li>The router&rsquo;s firmware processes the request, failing to properly sanitize the <code>pin</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the running process, potentially <code>root</code>.</li>
<li>The attacker gains control of the router, potentially allowing for further malicious activities, such as network traffic interception or modification of router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6992 allows a remote attacker to execute arbitrary commands on the Linksys MR9600 router. This can lead to a complete compromise of the device, allowing the attacker to monitor network traffic, change router configurations, or use the router as a foothold for further attacks within the network. Given the availability of a public exploit, the risk of widespread exploitation is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CVE-2026-6992 Exploitation Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Apply the Sigma rule <code>Detect Suspicious Shell Activity via Web Request</code> to detect potential command injection attempts.</li>
<li>Monitor web server logs for requests containing suspicious characters in the <code>cs-uri-query</code> field that target <code>/etc/init.d/run_central2.sh</code> to uncover exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6992</category><category>command-injection</category><category>router</category><category>rce</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-buffer-overflow/</link><pubDate>Sun, 26 Apr 2026 11:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 router version 1.0.0.5 allows a remote attacker to execute arbitrary code by exploiting the fromSafeClientFilter function in the /goform/SafeClientFilter endpoint through manipulation of the 'menufacturer/Go' argument.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Tenda F456 router, specifically version 1.0.0.5. The vulnerability resides within the <code>fromSafeClientFilter</code> function located in the <code>/goform/SafeClientFilter</code> file. Successful exploitation allows a remote attacker to inject and execute arbitrary code. Publicly available exploit code exists, increasing the risk of widespread exploitation targeting vulnerable Tenda F456 devices. This issue poses a significant threat to network security, as a compromised router can lead to data breaches, denial of service, or further network intrusion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda F456 router running firmware version 1.0.0.5 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeClientFilter</code> endpoint.</li>
<li>The crafted request includes a specially designed payload within the <code>menufacturer/Go</code> argument. This payload is designed to trigger a buffer overflow in the <code>fromSafeClientFilter</code> function.</li>
<li>The <code>fromSafeClientFilter</code> function processes the malicious input without proper bounds checking.</li>
<li>The oversized payload overwrites adjacent memory regions, potentially including return addresses or other critical data.</li>
<li>When the <code>fromSafeClientFilter</code> function attempts to return, the overwritten return address is used, redirecting execution flow to attacker-controlled memory.</li>
<li>The attacker-controlled memory contains shellcode or other malicious instructions.</li>
<li>The router executes the attacker&rsquo;s code, granting the attacker control over the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can result in complete compromise of the Tenda F456 router. An attacker can gain unauthorized access to network traffic, modify router settings, or use the compromised device as a launchpad for further attacks within the network. Given the public availability of exploit code, a large number of Tenda F456 routers could be targeted, potentially affecting numerous home and small business networks. A successful attack could lead to data theft, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7033 on the F456 1.0.0.5 routers.</li>
<li>Implement network intrusion detection systems (IDS) or intrusion prevention systems (IPS) rules to detect and block malicious requests targeting the <code>/goform/SafeClientFilter</code> endpoint.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/SafeClientFilter</code> with abnormally large <code>menufacturer/Go</code> argument values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7033</category><category>router</category></item><item><title>Tenda F451 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-buffer-overflow/</link><pubDate>Mon, 20 Apr 2026 11:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6631) in Tenda F451 router version 1.0.0.7_cn_svn7958 allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/webExcptypemanFilter component.</description><content:encoded><![CDATA[<p>CVE-2026-6631 is a critical buffer overflow vulnerability affecting Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. The vulnerability resides in the <code>fromwebExcptypemanFilter</code> function within the <code>/goform/webExcptypemanFilter</code> component of the router&rsquo;s <code>httpd</code> web server. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request with an overly long &lsquo;page&rsquo; parameter. Publicly available exploits exist, increasing the risk of widespread exploitation. Successful exploitation allows attackers to execute arbitrary code on the router, potentially leading to full device compromise and network access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F451 router exposed to the internet.</li>
<li>Attacker crafts a malicious HTTP GET or POST request targeting <code>/goform/webExcptypemanFilter</code>.</li>
<li>The crafted request includes the <code>page</code> parameter with a payload exceeding the buffer size allocated for it.</li>
<li>The <code>httpd</code> server processes the request and passes the <code>page</code> parameter to the vulnerable <code>fromwebExcptypemanFilter</code> function.</li>
<li>Due to the lack of proper bounds checking, the overly long <code>page</code> parameter overwrites adjacent memory regions on the stack.</li>
<li>The attacker carefully designs the overflow payload to overwrite the return address on the stack with the address of malicious code injected elsewhere in memory.</li>
<li>The <code>fromwebExcptypemanFilter</code> function completes execution and attempts to return, jumping to the attacker-controlled address.</li>
<li>The attacker&rsquo;s malicious code executes with the privileges of the <code>httpd</code> server, potentially gaining full control of the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6631 allows remote attackers to execute arbitrary code on vulnerable Tenda F451 routers. This can lead to complete device compromise, allowing attackers to modify router settings, intercept network traffic, or use the router as a point of entry for further attacks on the internal network. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, potentially impacting both home and small business networks. The availability of public exploits further increases the likelihood of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from Tenda to patch CVE-2026-6631.</li>
<li>Monitor web server logs for suspicious requests to <code>/goform/webExcptypemanFilter</code> with unusually long <code>page</code> parameters, using the Sigma rule <code>DetectTendaF451BufferOverflow</code>.</li>
<li>Implement network intrusion detection systems (IDS) to detect and block exploit attempts targeting CVE-2026-6631.</li>
<li>Consider deploying the Sigma rule <code>DetectTendaF451SuspiciousProcess</code> to identify unexpected processes spawned by the httpd daemon.</li>
<li>If patching is not immediately feasible, consider restricting access to the router&rsquo;s web interface from the public internet to mitigate the risk of remote exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer_overflow</category><category>cve-2026-6631</category><category>webserver</category></item><item><title>H3C Magic B1 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-b1-overflow/</link><pubDate>Sun, 19 Apr 2026 23:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-b1-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6581) in H3C Magic B1 routers allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the SetMobileAPInfoById function.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-6581, affects H3C Magic B1 routers up to version 100R004. The vulnerability resides in the <code>SetMobileAPInfoById</code> function within the <code>/goform/aspForm</code> file. An attacker can exploit this flaw by crafting a malicious request that manipulates the <code>param</code> argument, leading to a buffer overflow and potential remote code execution. This vulnerability is particularly concerning because a public exploit is available, increasing the risk of widespread exploitation. The vendor was notified about the vulnerability but has not responded. Given the ease of exploitation and the potential for complete system compromise, organizations using affected H3C routers should take immediate action.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable H3C Magic B1 router running a firmware version up to 100R004.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/aspForm</code> endpoint.</li>
<li>The request includes the <code>SetMobileAPInfoById</code> function call with an overly long value for the <code>param</code> argument, triggering the buffer overflow.</li>
<li>The overflow overwrites adjacent memory regions, including the return address on the stack.</li>
<li>The attacker sets the overwritten return address to point to attacker-controlled code or a ROP chain.</li>
<li>When the <code>SetMobileAPInfoById</code> function returns, execution jumps to the attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes with elevated privileges, potentially allowing full control of the router.</li>
<li>The attacker can then use the compromised router to establish a foothold within the network, exfiltrate data, or launch further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6581 allows a remote attacker to execute arbitrary code with root privileges on the H3C Magic B1 router. This can lead to complete compromise of the device, allowing the attacker to control network traffic, exfiltrate sensitive data, or use the router as a jumping-off point for further attacks within the network. Given the widespread use of these routers in small to medium-sized businesses and homes, a large number of devices are potentially vulnerable. There is no indication of victim counts or sectors targeted at this time.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect H3C Magic B1 Buffer Overflow Attempt</code> to your SIEM to detect exploitation attempts targeting CVE-2026-6581 via suspicious HTTP POST requests to <code>/goform/aspForm</code> (see Sigma rule below).</li>
<li>Apply appropriate input validation and sanitization measures if you manage the web server to mitigate buffer overflows.</li>
<li>Monitor network traffic for unusual activity originating from H3C Magic B1 routers.</li>
<li>Consider replacing H3C Magic B1 routers with more secure alternatives if updates are not available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6581</category><category>buffer-overflow</category><category>router</category><category>h3c</category></item><item><title>H3C Magic B0 Router Buffer Overflow Vulnerability (CVE-2026-6560)</title><link>https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-buffer-overflow/</link><pubDate>Sun, 19 Apr 2026 07:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6560) in H3C Magic B0 up to 100R002 allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the Edit_BasicSSID function of the /goform/aspForm file.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability (CVE-2026-6560) has been identified in H3C Magic B0 routers, specifically in versions up to 100R002. The vulnerability resides within the <code>Edit_BasicSSID</code> function of the <code>/goform/aspForm</code> file. An attacker can remotely exploit this flaw by crafting malicious input to the <code>param</code> argument, leading to arbitrary code execution on the device. Public exploits are reportedly available, increasing the risk of widespread exploitation. The vendor was notified about this vulnerability, but has not provided any response or patch as of April 2026. This poses a significant risk to users of the affected H3C Magic B0 routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable H3C Magic B0 router running firmware version 100R002 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/aspForm</code> endpoint.</li>
<li>The POST request includes the <code>Edit_BasicSSID</code> function call.</li>
<li>The <code>param</code> argument within the POST data contains a specially crafted string exceeding the buffer size allocated in the <code>Edit_BasicSSID</code> function.</li>
<li>The buffer overflow occurs when the <code>Edit_BasicSSID</code> function processes the oversized <code>param</code> argument without proper bounds checking.</li>
<li>The overflow overwrites adjacent memory regions, potentially including the return address on the stack.</li>
<li>The attacker gains control of the program execution flow.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device, exfiltrating data, or using it as a pivot point for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability (CVE-2026-6560) allows a remote attacker to execute arbitrary code on the affected H3C Magic B0 router. This could lead to a complete compromise of the device, including the ability to modify router settings, intercept network traffic, and potentially gain access to connected devices on the network. Given the availability of public exploits, widespread exploitation is possible, potentially impacting a large number of home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/aspForm</code> with unusually long <code>param</code> arguments (refer to the Attack Chain section).</li>
<li>Implement rate limiting for requests to <code>/goform/aspForm</code> to mitigate potential exploitation attempts (refer to the Attack Chain section).</li>
<li>Deploy the following Sigma rule to detect exploitation attempts targeting the vulnerable <code>Edit_BasicSSID</code> function.</li>
<li>Block network traffic originating from or destined to H3C Magic B0 devices until a patch is available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-6560</category><category>h3c</category><category>router</category><category>network device</category></item><item><title>Wavlink WL-WN530H4 OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wavlink-command-injection/</link><pubDate>Fri, 17 Apr 2026 11:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wavlink-command-injection/</guid><description>A remote command injection vulnerability exists in the Wavlink WL-WN530H4 router, specifically in the `strcat/snprintf` function of the `/cgi-bin/internet.cgi` file, allowing attackers to execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability, tracked as CVE-2026-6483, has been identified in Wavlink WL-WN530H4 routers running firmware version 20220721. The flaw resides within the <code>/cgi-bin/internet.cgi</code> file, specifically affecting the <code>strcat/snprintf</code> function. Successful exploitation enables remote attackers to execute arbitrary OS commands on the affected device.  The vulnerability is triggered by manipulating input to the vulnerable function. A public exploit is available, increasing the risk of widespread exploitation. Users are advised to upgrade to version 2026.04.16 to mitigate the risk. This vulnerability poses a significant threat due to the potential for complete system compromise, potentially leading to data exfiltration, device hijacking, or denial-of-service attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Wavlink WL-WN530H4 router running firmware version 20220721.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/cgi-bin/internet.cgi</code> endpoint.</li>
<li>The crafted request includes a payload designed to exploit the <code>strcat/snprintf</code> function.</li>
<li>The vulnerable <code>strcat/snprintf</code> function fails to properly sanitize the attacker-controlled input.</li>
<li>The unsanitized input is passed to a system call, resulting in OS command injection.</li>
<li>The attacker executes arbitrary OS commands with the privileges of the web server process.</li>
<li>The attacker can leverage the compromised system to perform actions such as modifying router configuration, installing malware, or pivoting to other network devices.</li>
<li>The attacker gains persistent access and control over the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary OS commands on the affected Wavlink router. This can lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the router as a launchpad for further attacks within the network. The lack of specifics regarding victimology suggests a wide potential impact affecting numerous users and potentially small businesses relying on these routers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Wavlink WL-WN530H4 router to firmware version 2026.04.16 to patch CVE-2026-6483.</li>
<li>Deploy the Sigma rule &ldquo;Detect Wavlink Command Injection Attempt&rdquo; to monitor for malicious requests targeting <code>/cgi-bin/internet.cgi</code>.</li>
<li>Monitor web server logs for suspicious activity and unauthorized access attempts following exploitation of CVE-2026-6483.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>cve-2026-6483</category></item><item><title>Totolink A3002MU Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-a3002mu-bo/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-a3002mu-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6194) exists in the Totolink A3002MU B20211125.1046 router firmware, specifically affecting the `/boafrm/formWlanSetup` component's HTTP request handler, which allows remote attackers to execute arbitrary code by manipulating the `wan-url` argument.</description><content:encoded><![CDATA[<p>CVE-2026-6194 describes a stack-based buffer overflow vulnerability present in Totolink A3002MU router firmware version B20211125.1046. The vulnerability resides within the HTTP Request Handler, specifically in the <code>sub_410188</code> function of the <code>/boafrm/formWlanSetup</code> file. A remote attacker can exploit this vulnerability by crafting a malicious HTTP request that manipulates the <code>wan-url</code> argument, leading to arbitrary code execution on the device. Publicly available exploit code increases the likelihood of exploitation. Successful exploitation allows an attacker to compromise the device and potentially gain control of the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A3002MU router running firmware B20211125.1046.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/boafrm/formWlanSetup</code> endpoint.</li>
<li>The crafted request includes a <code>wan-url</code> argument with a payload exceeding the buffer size allocated for it in the <code>sub_410188</code> function.</li>
<li>The HTTP Request Handler processes the request and calls the vulnerable <code>sub_410188</code> function.</li>
<li>Due to insufficient bounds checking, the oversized <code>wan-url</code> argument overflows the stack buffer.</li>
<li>The attacker overwrites critical data on the stack, including the return address.</li>
<li>Upon returning from the <code>sub_410188</code> function, execution is redirected to an attacker-controlled address.</li>
<li>The attacker executes arbitrary code, potentially gaining full control of the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6194 can lead to complete compromise of the affected Totolink A3002MU router. This allows attackers to eavesdrop on network traffic, modify DNS settings, inject malicious code into web pages served to connected clients, or use the compromised router as a botnet node. Given the widespread use of these routers, a large number of devices could be at risk, potentially impacting home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/boafrm/formWlanSetup</code> with unusually long <code>wan-url</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Suspicious WAN-URL Parameter Length&rdquo;).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect and alert on potential exploitation attempts.</li>
<li>If possible, block requests matching the patterns identified in the Sigma rules at your network perimeter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6194</category><category>buffer-overflow</category><category>totolink</category><category>router</category></item><item><title>TOTOLINK A7000R Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-buffer-overflow/</link><pubDate>Mon, 13 Apr 2026 07:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6168) exists in TOTOLINK A7000R devices up to version 9.1.0u.6115, allowing remote attackers to execute arbitrary code via a crafted ssid5g argument to the setWiFiEasyGuestCfg function in /cgi-bin/cstecgi.cgi.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, tracked as CVE-2026-6168, has been identified in TOTOLINK A7000R routers with firmware versions up to 9.1.0u.6115. The vulnerability resides within the <code>setWiFiEasyGuestCfg</code> function located in the <code>/cgi-bin/cstecgi.cgi</code> file. Successful exploitation allows a remote attacker to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. Given the widespread use of TOTOLINK devices, this vulnerability poses a significant threat to home and small business networks. Exploitation is possible with low privileges, as it only requires authentication to the device&rsquo;s web interface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the TOTOLINK A7000R web interface. This step assumes default credentials or compromised credentials.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The request includes the <code>setWiFiEasyGuestCfg</code> function call.</li>
<li>The <code>ssid5g</code> argument within the POST request is populated with a string exceeding the buffer&rsquo;s capacity.</li>
<li>The vulnerable <code>setWiFiEasyGuestCfg</code> function in <code>/cgi-bin/cstecgi.cgi</code> processes the oversized <code>ssid5g</code> argument without proper bounds checking.</li>
<li>This leads to a stack-based buffer overflow, overwriting adjacent memory regions.</li>
<li>The attacker leverages the overflow to inject and execute arbitrary code on the device.</li>
<li>Successful code execution can grant the attacker full control of the router, enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6168 allows a remote attacker to execute arbitrary code on the vulnerable TOTOLINK A7000R device. This can lead to complete compromise of the router, including the ability to intercept network traffic, modify DNS settings, inject malicious scripts into websites, and use the router as a pivot point for further attacks within the network. This vulnerability affects potentially thousands of devices, particularly in home and small business environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply firmware updates immediately if TOTOLINK releases a patch for CVE-2026-6168.</li>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusually long <code>ssid5g</code> parameters, using the provided Sigma rule.</li>
<li>Implement network intrusion detection systems (IDS) rules to detect attempts to exploit stack-based buffer overflows targeting TOTOLINK devices.</li>
<li>Restrict access to the router&rsquo;s web interface to trusted IP addresses, if possible.</li>
<li>Enforce strong and unique passwords for all router accounts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>totolink</category><category>buffer-overflow</category><category>cve-2026-6168</category><category>router</category></item><item><title>Totolink A800R Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-a800r-buffer-overflow/</link><pubDate>Mon, 13 Apr 2026 04:26:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-a800r-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in the Totolink A800R router version 4.1.2cu.5137_B20200730, allowing unauthenticated attackers to potentially execute arbitrary code by overflowing the apcliSsid argument in the setAppEasyWizardConfig function within the /lib/cste_modules/app.so library.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-6157, has been discovered in Totolink A800R routers running firmware version 4.1.2cu.5137_B20200730. The vulnerability resides within the <code>setAppEasyWizardConfig</code> function in the <code>/lib/cste_modules/app.so</code> library. Successful exploitation allows remote attackers to potentially execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of widespread exploitation. Routers are often the perimeter defense for networks making them lucrative targets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A800R router with firmware version 4.1.2cu.5137_B20200730 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>setAppEasyWizardConfig</code> function.</li>
<li>The malicious request includes an overly long string as the value for the <code>apcliSsid</code> argument.</li>
<li>The router receives the HTTP request and passes the <code>apcliSsid</code> argument to the <code>setAppEasyWizardConfig</code> function.</li>
<li>The <code>setAppEasyWizardConfig</code> function copies the contents of <code>apcliSsid</code> into a fixed-size buffer without proper bounds checking.</li>
<li>The overly long <code>apcliSsid</code> string overflows the buffer, overwriting adjacent memory locations.</li>
<li>The attacker carefully crafts the overflowed data to overwrite the return address of the function.</li>
<li>When the function returns, control is transferred to the attacker&rsquo;s code, leading to arbitrary code execution. This could lead to the installation of malware or complete control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability grants the attacker the ability to execute arbitrary code on the affected Totolink A800R router. This can result in complete compromise of the device, enabling the attacker to intercept network traffic, modify router settings, or use the router as a launching point for further attacks within the network. Given the availability of public exploits, a large number of devices could be vulnerable, making this a high-impact threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Totolink to patch CVE-2026-6157.</li>
<li>Monitor network traffic for suspicious HTTP requests targeting the <code>setAppEasyWizardConfig</code> function, as described in the attack chain. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>If updates are unavailable, consider replacing the vulnerable device.</li>
<li>Disable remote management access to the router to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6157</category><category>buffer-overflow</category><category>router</category><category>iot</category></item><item><title>Across DR-810 Unauthenticated File Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-across-dr810-file-disclosure/</link><pubDate>Sun, 12 Apr 2026 13:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-across-dr810-file-disclosure/</guid><description>Across DR-810 routers are vulnerable to unauthenticated file disclosure, allowing remote attackers to download the rom-0 backup file containing sensitive information, such as router passwords and configuration data, via a simple GET request to the rom-0 endpoint.</description><content:encoded><![CDATA[<p>The Across DR-810 router contains an unauthenticated file disclosure vulnerability (CVE-2019-25706) that allows remote attackers to retrieve sensitive information. By sending a simple GET request to the <code>/rom-0</code> endpoint, an attacker can download a backup file containing router passwords, configuration details, and potentially other sensitive data. This vulnerability exists because the <code>/rom-0</code> endpoint does not require authentication, allowing anyone with network access to the router to retrieve the backup file. Successful exploitation leads to complete compromise of the device&rsquo;s configuration and potential lateral movement within the network if credentials are reused. This vulnerability was published on 2026-04-12.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Across DR-810 router exposed on the network.</li>
<li>Attacker crafts an HTTP GET request targeting the <code>/rom-0</code> endpoint.</li>
<li>The router responds with the <code>rom-0</code> backup file without requiring authentication.</li>
<li>Attacker downloads the <code>rom-0</code> backup file.</li>
<li>Attacker decompresses the downloaded <code>rom-0</code> file, which is likely compressed to reduce size.</li>
<li>The attacker parses the decompressed file to extract sensitive information such as router passwords.</li>
<li>Attacker uses the extracted router passwords to gain administrative access to the router&rsquo;s web interface.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to retrieve sensitive information, including router passwords and configuration data. This can lead to complete compromise of the affected router. An attacker can then modify router settings, intercept network traffic, or potentially use the compromised router as a pivot point to access other systems on the network. If the router passwords are reused across multiple systems, the impact could extend beyond the compromised router, affecting other devices and services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to the <code>/rom-0</code> endpoint on Across DR-810 routers to detect potential exploitation attempts using the provided Sigma rule.</li>
<li>Inspect network traffic for unusual downloads from Across DR-810 routers, focusing on responses from the <code>/rom-0</code> endpoint.</li>
<li>Block access to the <code>/rom-0</code> endpoint on Across DR-810 routers via firewall rules to prevent unauthorized access.</li>
<li>Review the provided reference URLs for additional context and potential mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2019-25706</category><category>file-disclosure</category><category>router</category><category>network</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</link><pubDate>Sun, 12 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</guid><description>A remote stack-based buffer overflow vulnerability exists in the fromDhcpListClient function of the /goform/DhcpListClient component (httpd) within Tenda F451 firmware version 1.0.0.7, triggered by manipulating the 'page' argument, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda F451 router firmware version 1.0.0.7. The vulnerability resides in the <code>fromDhcpListClient</code> function within the <code>/goform/DhcpListClient</code> component&rsquo;s httpd service. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious <code>page</code> argument. This can lead to arbitrary code execution on the device. Given the public availability of the exploit (CVE-2026-6120), Tenda F451 routers are at immediate risk of compromise if not properly secured. This vulnerability poses a significant threat due to the widespread use of Tenda routers in home and small office environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router running vulnerable firmware version 1.0.0.7.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/DhcpListClient</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a string exceeding the buffer size allocated for it in the <code>fromDhcpListClient</code> function.</li>
<li>The <code>httpd</code> service on the router receives the malicious request and passes the <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromDhcpListClient</code> function attempts to copy the oversized <code>page</code> argument into a fixed-size buffer on the stack, causing a buffer overflow.</li>
<li>The overflow overwrites adjacent stack memory, including the return address of the function.</li>
<li>The attacker controls the overwritten return address, redirecting execution to attacker-controlled code or a ROP chain.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete device compromise and network access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda F451 router. This allows attackers to control the device, intercept network traffic, change DNS settings, inject malicious scripts into web pages served to connected devices, or use the router as a pivot point for further attacks within the network. This vulnerability affects all users of the Tenda F451 router running firmware version 1.0.0.7, potentially impacting thousands of devices globally. Given the high CVSS score of 8.8, the risk is substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the <code>/goform/DhcpListClient</code> endpoint, especially those with unusually long <code>page</code> parameters (refer to the rule <code>Tenda F451 Suspicious URI Length</code>).</li>
<li>Inspect network traffic for abnormal patterns related to compromised routers (unusual DNS requests, connections to known malicious IPs).</li>
<li>Implement rate limiting and input validation on web server endpoints where possible to mitigate buffer overflow attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-6120, although patches may not be available.</li>
<li>Consider deploying network intrusion detection systems (NIDS) to identify and block exploitation attempts (refer to the <code>Tenda F451 Buffer Overflow Attempt</code> rule).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-6120</category><category>iot</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-overflow/</link><pubDate>Sun, 12 Apr 2026 08:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-overflow/</guid><description>Tenda F451 router version 1.0.0.7 is vulnerable to a stack-based buffer overflow in the frmL7ProtForm function, enabling remote attackers to execute arbitrary code by manipulating the 'page' argument.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda F451 router version 1.0.0.7. The vulnerability resides within the <code>frmL7ProtForm</code> function of the <code>/goform/L7Prot</code> component, specifically within the <code>httpd</code> service. A remote attacker can exploit this flaw by crafting a malicious request targeting the <code>page</code> argument. Successful exploitation allows the attacker to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to affected devices, potentially leading to full device compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F451 router running firmware version 1.0.0.7.</li>
<li>Attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/L7Prot</code> endpoint.</li>
<li>The malicious request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>frmL7ProtForm</code> function.</li>
<li>The <code>httpd</code> service processes the request without proper bounds checking on the <code>page</code> argument.</li>
<li>The oversized payload overflows the stack buffer during the execution of the <code>frmL7ProtForm</code> function.</li>
<li>The buffer overflow overwrites adjacent memory regions on the stack, including the return address.</li>
<li>The attacker-controlled return address redirects execution to attacker-supplied code or a return-oriented programming (ROP) chain.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F451 router. This can lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the device as a bot in a botnet. Given the availability of public exploits, vulnerable devices are at high risk of compromise. The number of potentially affected devices is substantial, as the Tenda F451 is a widely used router model.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/L7Prot</code> with unusually long <code>page</code> parameters, deploying the Sigma rule <code>Detect Tenda F451 Buffer Overflow Attempt</code> to identify potential exploitation attempts.</li>
<li>Since no patch is available, consider replacing the Tenda F451 1.0.0.7 with a more secure router or firewall solution.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other network devices.</li>
<li>Disable remote administration access to the router to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6122</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item><item><title>Tenda F451 Stack-Based Buffer Overflow Vulnerability (CVE-2026-6121)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-overflow/</link><pubDate>Sun, 12 Apr 2026 08:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6121) exists in the WrlclientSet function of the /goform/WrlclientSet file in the httpd component of Tenda F451 version 1.0.0.7, allowing remote attackers to execute arbitrary code by manipulating the GO argument.</description><content:encoded><![CDATA[<p>CVE-2026-6121 is a stack-based buffer overflow vulnerability affecting Tenda F451 router version 1.0.0.7. The vulnerability resides within the <code>WrlclientSet</code> function located in the <code>/goform/WrlclientSet</code> file of the <code>httpd</code> component. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the affected router, specifically manipulating the <code>GO</code> argument. Due to insufficient bounds checking on the <code>GO</code> argument&rsquo;s size when passed to the <code>WrlclientSet</code> function, an attacker can write beyond the allocated buffer on the stack, potentially leading to arbitrary code execution. Publicly available exploits exist, increasing the risk of widespread exploitation. Routers that are accessible from the internet are at highest risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router version 1.0.0.7 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>Within the HTTP POST request, the attacker includes the <code>GO</code> argument, filling it with a payload exceeding the buffer size allocated for it within the <code>WrlclientSet</code> function.</li>
<li>The <code>httpd</code> component of the Tenda F451 router receives the HTTP request and passes the <code>GO</code> argument to the vulnerable <code>WrlclientSet</code> function.</li>
<li>Due to the buffer overflow, the attacker&rsquo;s payload overwrites adjacent memory locations on the stack.</li>
<li>The attacker&rsquo;s payload overwrites the return address on the stack, redirecting execution flow to attacker-controlled code.</li>
<li>The attacker-controlled code executes with the privileges of the <code>httpd</code> process, allowing the attacker to perform actions such as modifying router configuration, executing system commands, or establishing a reverse shell.</li>
<li>The attacker gains persistent access to the router and potentially the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6121 can lead to complete compromise of the affected Tenda F451 router. An attacker can gain unauthorized access to the device&rsquo;s configuration, potentially modifying DNS settings, firewall rules, or other critical parameters. This can lead to redirection of user traffic, denial-of-service attacks, or the establishment of a foothold within the targeted network for further malicious activities. Given the ease of exploitation due to the publicly available exploit code, a large number of Tenda F451 routers could be compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/WrlclientSet</code> with abnormally long <code>GO</code> parameter values to detect potential exploitation attempts (see Sigma rule below and enable webserver logging).</li>
<li>Implement rate limiting for requests to the <code>/goform/WrlclientSet</code> endpoint to mitigate potential brute-force exploitation attempts (configure your firewall or WAF).</li>
<li>Upgrade to a patched firmware version when available or replace the affected devices, if the vendor does not provide a fix.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6121</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-rce/</link><pubDate>Fri, 10 Apr 2026 00:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-rce/</guid><description>A stack-based buffer overflow vulnerability in the Tenda F451 router (version 1.0.0.7) allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the fromRouteStatic function of the /goform/RouteStatic file.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5989, affects the Tenda F451 router, specifically version 1.0.0.7. The vulnerability lies within the <code>fromRouteStatic</code> function of the <code>/goform/RouteStatic</code> file. By manipulating the <code>page</code> argument, a remote attacker can trigger a stack-based buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat as it allows unauthenticated remote attackers to compromise the router, potentially leading to network disruption, data theft, or use of the device in botnet activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda F451 router (version 1.0.0.7) exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/RouteStatic</code> endpoint.</li>
<li>The request includes a <code>page</code> argument with a payload designed to overflow the stack buffer in the <code>fromRouteStatic</code> function.</li>
<li>The vulnerable <code>fromRouteStatic</code> function processes the malicious <code>page</code> argument without proper bounds checking.</li>
<li>The buffer overflow overwrites critical data on the stack, including the return address.</li>
<li>Upon function return, control is redirected to the attacker-controlled memory region.</li>
<li>The attacker executes arbitrary code injected into the overflowed buffer, such as downloading and executing a reverse shell.</li>
<li>The attacker gains remote access to the router, potentially allowing further exploitation or network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5989 allows an attacker to gain complete control of the Tenda F451 router. This can lead to a variety of damaging outcomes, including denial-of-service attacks against the local network, interception of network traffic, modification of router settings, and the potential use of the compromised router as a node in a botnet. Given the widespread use of Tenda routers in home and small business environments, a large number of devices could be at risk if this vulnerability is actively exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/RouteStatic</code> containing abnormally long <code>page</code> arguments, as this is indicative of potential exploit attempts. Deploy the Sigma rule <code>Detect Tenda F451 Exploit Attempt</code> to detect these malicious requests.</li>
<li>Implement rate limiting on requests to the <code>/goform/RouteStatic</code> endpoint to mitigate potential denial-of-service attacks.</li>
<li>Since there is no patch available, consider replacing vulnerable Tenda F451 routers with more secure devices from other vendors.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>tenda</category><category>router</category><category>buffer_overflow</category><category>rce</category></item><item><title>D-Link DIR-605L Router Buffer Overflow Vulnerability (CVE-2026-5980)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-buffer-overflow/</link><pubDate>Thu, 09 Apr 2026 21:16:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in the D-Link DIR-605L router version 2.13B01, allowing a remote attacker to execute arbitrary code by manipulating the `curTime` argument in the `formSetMACFilter` function.</description><content:encoded><![CDATA[<p>CVE-2026-5980 is a critical buffer overflow vulnerability affecting the D-Link DIR-605L router, specifically version 2.13B01. The vulnerability resides in the <code>formSetMACFilter</code> function within the <code>/goform/formSetMACFilter</code> component&rsquo;s POST Request Handler. A remote attacker can exploit this by sending a crafted POST request with a malicious <code>curTime</code> argument, leading to a buffer overflow. Exploit code is publicly available. Due to the product&rsquo;s end-of-life status, no patch is available, making unpatched devices highly vulnerable. This allows for potential remote code execution and complete compromise of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-605L router (version 2.13B01) exposed to the internet.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/goform/formSetMACFilter</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>curTime</code> parameter, injecting a string exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s <code>formSetMACFilter</code> function processes the POST request without proper bounds checking on the <code>curTime</code> argument.</li>
<li>The oversized <code>curTime</code> string overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite critical data, such as return addresses or function pointers.</li>
<li>When the <code>formSetMACFilter</code> function attempts to return, the overwritten return address is used, redirecting execution to attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution on the router, potentially installing malware, changing configurations, or using the device for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5980 allows a remote attacker to gain complete control over the vulnerable D-Link DIR-605L router. Given that the affected product is no longer supported, a large number of legacy routers remain vulnerable. Attackers can leverage compromised routers to establish botnets, conduct man-in-the-middle attacks, or gain unauthorized access to internal networks connected to the router. The lack of patches elevates the severity, as affected users have no direct mitigation available other than replacing the device.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect D-Link DIR-605L Buffer Overflow Attempt</code> to identify malicious POST requests targeting the <code>/goform/formSetMACFilter</code> endpoint on D-Link DIR-605L devices.</li>
<li>Implement network segmentation to isolate potentially vulnerable D-Link DIR-605L routers to limit the impact of a successful compromise.</li>
<li>If possible, replace D-Link DIR-605L routers (version 2.13B01) with newer, supported devices to eliminate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>router</category><category>d-link</category></item><item><title>D-Link DIR-605L Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-bo/</link><pubDate>Thu, 09 Apr 2026 21:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-bo/</guid><description>A remote buffer overflow vulnerability exists in the D-Link DIR-605L version 2.13B01 due to improper handling of the 'curTime' argument in the '/goform/formVirtualServ' POST request handler, potentially allowing attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-5979, has been identified in D-Link DIR-605L router with firmware version 2.13B01. The vulnerability resides in the <code>formVirtualServ</code> function within the <code>/goform/formVirtualServ</code> component, specifically within the POST request handler. By manipulating the <code>curTime</code> argument, a remote attacker can trigger a buffer overflow. According to the NVD, an exploit is publicly available, increasing the risk of exploitation. This vulnerability affects end-of-life products, making patching impossible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable D-Link DIR-605L router running firmware 2.13B01.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>/goform/formVirtualServ</code> endpoint.</li>
<li>The POST request includes the <code>curTime</code> argument with a value exceeding the buffer&rsquo;s capacity.</li>
<li>The router&rsquo;s <code>formVirtualServ</code> function processes the POST request without proper bounds checking.</li>
<li>The oversized <code>curTime</code> value overwrites adjacent memory regions on the stack or heap.</li>
<li>The attacker carefully crafts the overflow payload to overwrite the return address.</li>
<li>Upon returning from the <code>formVirtualServ</code> function, control is transferred to the attacker-controlled address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability (CVE-2026-5979) can lead to complete compromise of the D-Link DIR-605L router. Attackers could potentially execute arbitrary code, enabling them to modify router settings, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Due to the product being end-of-life, a patch is not available. The number of vulnerable devices is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor webserver logs for requests to <code>/goform/formVirtualServ</code> with unusually long <code>curTime</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Suspiciously Long curTime Parameter in D-Link Routers&rdquo;).</li>
<li>Implement network intrusion detection system (IDS) rules to detect suspicious traffic patterns associated with buffer overflow exploits targeting web interfaces.</li>
<li>Since this device is end-of-life, consider replacing the D-Link DIR-605L router with a supported model to mitigate the risk, as there will be no patches issued.</li>
<li>Examine network traffic for unusual outbound connections originating from D-Link DIR-605L routers to identify potentially compromised devices (see Sigma rule &ldquo;Detect Outbound Connections from D-Link Routers&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dlink</category><category>router</category><category>buffer_overflow</category><category>cve-2026-5979</category></item><item><title>Decolua 9router Authorization Bypass Vulnerability (CVE-2026-5842)</title><link>https://feed.craftedsignal.io/briefs/2026-04-decolua-auth-bypass/</link><pubDate>Thu, 09 Apr 2026 05:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-decolua-auth-bypass/</guid><description>CVE-2026-5842 is an authorization bypass vulnerability in decolua 9router versions up to 0.3.47, allowing remote attackers to gain unauthorized access via manipulation of the /api endpoint.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-5842, affects decolua 9router versions up to 0.3.47. The vulnerability resides within an unknown function of the <code>/api</code> endpoint, specifically the Administrative API. Successful exploitation of this flaw allows a remote attacker to bypass authorization controls, potentially gaining administrative privileges. A public exploit for this vulnerability has been disclosed, increasing the risk of exploitation. Organizations using vulnerable versions of decolua 9router should upgrade to version 0.3.75 as soon as possible to mitigate the risk. This vulnerability was published on April 9, 2026 and poses a significant threat due to the availability of a public exploit.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable decolua 9router instance running a version prior to 0.3.75.</li>
<li>The attacker sends a crafted HTTP request to the <code>/api</code> endpoint.</li>
<li>The crafted request exploits the authorization bypass vulnerability in the targeted function.</li>
<li>The vulnerable application fails to properly validate the attacker&rsquo;s authorization, granting them access.</li>
<li>The attacker gains unauthorized access to administrative functionalities.</li>
<li>The attacker leverages the unauthorized access to modify router configurations.</li>
<li>The attacker can then potentially perform actions like changing DNS settings, creating rogue user accounts, or disrupting network services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5842 allows attackers to bypass authorization and gain unauthorized administrative access to the decolua 9router. This can lead to complete compromise of the router, allowing attackers to eavesdrop on network traffic, redirect traffic to malicious sites, or disrupt network services. Given the availability of a public exploit, vulnerable routers are at high risk of compromise. This vulnerability can have severe consequences for both home and business networks relying on decolua 9router.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all decolua 9router instances to version 0.3.75 or later to remediate CVE-2026-5842.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/api</code> endpoint using the Sigma rule provided below.</li>
<li>Implement firewall rules to restrict access to the administrative interface of the router.</li>
<li>Review and audit existing router configurations for any unauthorized changes after applying the provided Sigma rule to detect any potential intrusions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>authorization-bypass</category><category>router</category></item><item><title>D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-command-injection/</link><pubDate>Thu, 09 Apr 2026 05:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-command-injection/</guid><description>A command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.</description><content:encoded><![CDATA[<p>CVE-2026-5844 describes a critical command injection vulnerability affecting D-Link DIR-882 routers running firmware version 1.01B02. The vulnerability resides in the <code>sprintf</code> function within the <code>prog.cgi</code> script, specifically within the HNAP1 SetNetworkSettings Handler. A remote, unauthenticated attacker can exploit this flaw by manipulating the <code>IPAddress</code> argument, injecting arbitrary OS commands that are then executed with elevated privileges. The vulnerability is considered critical due to the potential for complete system compromise and the availability of a public exploit. This vulnerability impacts products that are no longer supported by the maintainer, increasing the risk for users who have not migrated to newer devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-882 router running firmware version 1.01B02.</li>
<li>The attacker sends a crafted HTTP request to the <code>prog.cgi</code> endpoint.</li>
<li>The HTTP request targets the HNAP1 SetNetworkSettings Handler.</li>
<li>The attacker manipulates the <code>IPAddress</code> argument within the HTTP request, injecting malicious OS commands.</li>
<li>The <code>sprintf</code> function in <code>prog.cgi</code> processes the attacker-controlled <code>IPAddress</code> argument without proper sanitization.</li>
<li>The injected OS commands are executed on the router&rsquo;s operating system due to the command injection vulnerability in <code>sprintf</code>.</li>
<li>The attacker gains remote code execution on the router.</li>
<li>The attacker can then perform actions such as modifying router settings, eavesdropping on network traffic, or using the router as a botnet node.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5844 allows a remote attacker to execute arbitrary OS commands on the vulnerable D-Link DIR-882 router. This can lead to a complete compromise of the device, enabling attackers to reconfigure the router, intercept network traffic, or use the compromised device as part of a botnet. The vulnerability affects end-of-life products, meaning no official patches are available. The impact is significant due to the widespread use of these routers in home and small business networks, where they can act as a gateway to internal systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect D-Link DIR-882 Command Injection Attempt</code> to detect suspicious requests to <code>prog.cgi</code> containing shell metacharacters.</li>
<li>Block access to the URL <code>https://files.catbox.moe/ei31k1.zip</code> to prevent the download of the publicly available exploit (IOC).</li>
<li>Monitor web server logs for HTTP requests to <code>prog.cgi</code> with unusually long <code>IPAddress</code> parameters (log source: webserver).</li>
<li>Implement network intrusion detection systems (IDS) rules to identify and block exploit attempts targeting CVE-2026-5844 (log source: network_connection).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>d-link</category><category>router</category><category>cve-2026-5844</category></item><item><title>Tenda AC15 Router Stack-Based Buffer Overflow (CVE-2026-5830)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ac15-overflow/</link><pubDate>Thu, 09 Apr 2026 02:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ac15-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5830) in Tenda AC15 firmware version 15.03.05.18 allows remote attackers to execute arbitrary code by manipulating password change parameters, potentially leading to complete device compromise.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, tracked as CVE-2026-5830, has been identified in Tenda AC15 routers running firmware version 15.03.05.18. The vulnerability resides in the <code>websGetVar</code> function within the <code>/goform/SysToolChangePwd</code> file, which handles password change requests. By crafting malicious requests and manipulating the <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> arguments, an attacker can overwrite the stack, potentially leading to arbitrary code execution. The vulnerability is remotely exploitable by an authenticated user, and publicly available exploit code exists, increasing the risk of widespread exploitation. This poses a significant threat to home and small business networks using affected Tenda AC15 routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to the router&rsquo;s web management interface, potentially through weak credentials or brute-forcing.</li>
<li>The attacker crafts a malicious HTTP POST request to <code>/goform/SysToolChangePwd</code>.</li>
<li>The crafted request includes oversized data within the <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> parameters.</li>
<li>The <code>websGetVar</code> function processes the request without proper bounds checking.</li>
<li>The oversized data overflows the stack buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address on the stack.</li>
<li>The <code>websGetVar</code> function returns, diverting execution to the attacker-controlled address.</li>
<li>The attacker-controlled address contains shellcode that executes arbitrary commands, potentially granting complete control over the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda AC15 router. This could lead to complete device compromise, including unauthorized access to network traffic, modification of router settings, installation of malware, and use of the compromised device as a botnet node. Given the potentially widespread use of Tenda AC15 routers in home and small business environments, a large number of devices could be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from Tenda to remediate CVE-2026-5830 as soon as they become available.</li>
<li>Monitor webserver logs for suspicious POST requests to <code>/goform/SysToolChangePwd</code> with unusually long <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> parameters and deploy the Sigma rule <code>Detect Tenda AC15 Password Change Overflow</code>.</li>
<li>Implement strong password policies and multi-factor authentication to prevent unauthorized access to the router&rsquo;s web management interface.</li>
<li>Restrict access to the router&rsquo;s web management interface to trusted networks only by configuring firewall rules.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5830</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>stack-overflow</category></item><item><title>D-LINK Router M60 and DIR-3040 'Airsnitch' Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-router-vulnerability/</link><pubDate>Wed, 08 Apr 2026 09:58:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-router-vulnerability/</guid><description>The 'Airsnitch' vulnerability in D-LINK Router M60 and DIR-3040 allows an attacker from an adjacent network to bypass security measures, disclose confidential information, and manipulate network traffic.</description><content:encoded><![CDATA[<p>The &lsquo;Airsnitch&rsquo; vulnerability affects D-LINK Router models M60 and DIR-3040. An attacker positioned within an adjacent network can exploit this flaw to circumvent security protocols. This access allows the attacker to potentially expose sensitive data and manipulate network traffic. The specifics of the vulnerability exploitation are not detailed in this advisory, but the impact suggests a significant compromise of network security and data integrity. Defenders should prioritize identifying and mitigating this vulnerability to prevent unauthorized access and data breaches. This vulnerability poses a risk to both home and enterprise networks utilizing the affected D-LINK router models.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to an adjacent network, either physically or via compromised wireless access.</li>
<li>Attacker sends crafted network packets targeting the D-LINK router&rsquo;s management interface.</li>
<li>The &lsquo;Airsnitch&rsquo; vulnerability is exploited, bypassing authentication or authorization checks.</li>
<li>Attacker gains unauthorized access to the router&rsquo;s configuration settings.</li>
<li>Attacker modifies DNS settings to redirect traffic to malicious servers.</li>
<li>Attacker intercepts and analyzes network traffic, capturing sensitive information like usernames and passwords.</li>
<li>Attacker injects malicious code into network traffic, potentially compromising other devices on the network.</li>
<li>Attacker maintains persistent access by creating a rogue administrator account or installing malicious firmware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the &lsquo;Airsnitch&rsquo; vulnerability can lead to significant compromise of network security. Attackers can gain unauthorized access to sensitive information, manipulate network traffic, and potentially compromise other devices on the network. This can result in data breaches, financial losses, and reputational damage. The number of potential victims is significant, given the widespread use of D-LINK routers in both home and enterprise environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Analyze network traffic for suspicious patterns indicative of unauthorized access attempts to the D-LINK router&rsquo;s management interface to facilitate tuning of existing firewall rules and creation of new rules.</li>
<li>Monitor DNS settings on D-LINK routers for unauthorized modifications using network monitoring tools.</li>
<li>Implement strict access control policies on the adjacent network to limit the attacker&rsquo;s ability to reach the D-LINK routers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>d-link</category><category>router</category><category>airsnitch</category><category>vulnerability</category><category>network-traffic-manipulation</category></item><item><title>Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5686)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-stack-overflow/</link><pubDate>Mon, 06 Apr 2026 22:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-stack-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5686) exists in the Tenda CX12L router version 16.03.53.12, allowing remote attackers to potentially execute arbitrary code by manipulating the 'page' argument in the `/goform/RouteStatic` endpoint.</description><content:encoded><![CDATA[<p>CVE-2026-5686 is a critical vulnerability affecting Tenda CX12L routers running firmware version 16.03.53.12. This stack-based buffer overflow is located in the <code>fromRouteStatic</code> function within the <code>/goform/RouteStatic</code> file. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request with a malicious <code>page</code> argument. Publicly available exploit code exists, increasing the risk of widespread exploitation. Successful exploitation could lead to arbitrary code execution, potentially allowing attackers to gain full control of the affected router. This poses a significant risk to home and small business networks using the vulnerable device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda CX12L router running firmware version 16.03.53.12.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/goform/RouteStatic</code>.</li>
<li>The request includes a <code>page</code> argument with a string exceeding the buffer size allocated to the <code>fromRouteStatic</code> function.</li>
<li>The oversized <code>page</code> argument overwrites adjacent memory on the stack, including the return address.</li>
<li>When the <code>fromRouteStatic</code> function returns, it attempts to jump to the overwritten return address controlled by the attacker.</li>
<li>The attacker&rsquo;s payload, injected via the overflowed buffer, is executed with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains remote code execution on the router.</li>
<li>The attacker can then use the compromised router as a foothold for further attacks, such as network reconnaissance, lateral movement, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5686 allows a remote attacker to execute arbitrary code on the affected Tenda CX12L router. This could lead to a complete compromise of the device, enabling attackers to modify router settings, intercept network traffic, or use the router as a proxy for malicious activities. Given the widespread use of Tenda routers in home and small business networks, this vulnerability could have a significant impact, potentially affecting thousands of users. A successful attack could lead to data breaches, service disruptions, and further compromise of connected devices within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-5686.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/RouteStatic</code> with unusually long <code>page</code> parameters, using the provided Sigma rule.</li>
<li>Implement network intrusion detection systems (IDS) to detect and block exploit attempts targeting this vulnerability.</li>
<li>Restrict access to the router&rsquo;s administrative interface to trusted networks or IP addresses to limit the attack surface.</li>
<li>Regularly review router configurations and security settings to ensure they align with best practices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5686</category><category>tenda</category><category>router</category><category>stack-based buffer overflow</category><category>remote code execution</category></item><item><title>Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 22:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in the Tenda CX12L router (version 16.03.53.12) due to improper handling of the 'page' argument in the 'fromwebExcptypemanFilter' function, potentially allowing attackers with local network access to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda CX12L routers running firmware version 16.03.53.12. The vulnerability resides within the <code>fromwebExcptypemanFilter</code> function in the <code>/goform/webExcptypemanFilter</code> file.  An attacker with local network access can exploit this flaw by manipulating the <code>page</code> argument passed to this function, leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-5684, has a CVSS v3.1 score of 8.0, indicating a high severity. Public exploits for this vulnerability are available, making it crucial for network administrators to address this issue promptly. Successful exploitation could allow an attacker to gain complete control of the router, potentially leading to data theft, network compromise, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the local network where the Tenda CX12L router is located.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/webExcptypemanFilter</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>fromwebExcptypemanFilter</code> function.</li>
<li>The router processes the HTTP request and passes the overly long <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromwebExcptypemanFilter</code> function attempts to write the contents of the <code>page</code> argument into a fixed-size buffer on the stack.</li>
<li>Due to the excessive length of the <code>page</code> argument, the buffer overflows, overwriting adjacent memory regions on the stack.</li>
<li>The attacker leverages the buffer overflow to overwrite the return address on the stack with the address of malicious code or a ROP chain.</li>
<li>When the <code>fromwebExcptypemanFilter</code> function returns, control is transferred to the attacker-controlled code, allowing for arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5684 allows an attacker with local network access to gain complete control of the affected Tenda CX12L router. This can lead to a variety of malicious activities, including unauthorized access to network traffic, modification of router settings, deployment of malicious firmware, and use of the compromised router as a botnet node. Given the availability of public exploits, organizations using this router model are at significant risk. The number of potential victims is dependent on the number of unpatched Tenda CX12L devices deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor webserver logs for HTTP requests targeting the <code>/goform/webExcptypemanFilter</code> endpoint with abnormally long <code>page</code> parameters to detect potential exploitation attempts. (Log Source: webserver, Rule: &ldquo;Detect Tenda CX12L Web Request with Long Page Parameter&rdquo;)</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda CX12L Stack Buffer Overflow Attempt&rdquo; to identify suspicious process creations following a potential exploit.</li>
<li>Review and restrict local network access to the Tenda CX12L router to reduce the attack surface, as the exploit requires local network access.</li>
<li>Contact Tenda for a security patch or firmware update to address CVE-2026-5684.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-5684</category></item><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-overflow/</link><pubDate>Sun, 05 Apr 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5604) in Tenda CH22 1.0.0.1 allows remote attackers to execute arbitrary code by manipulating the 'standard' argument in the formCertLocalPrecreate function of the /goform/CertLocalPrecreate file within the Parameter Handler component.</description><content:encoded><![CDATA[<p>CVE-2026-5604 details a critical security vulnerability affecting Tenda CH22 router version 1.0.0.1. The vulnerability is a stack-based buffer overflow located in the <code>formCertLocalPrecreate</code> function within the <code>/goform/CertLocalPrecreate</code> file, which handles parameters. Attackers can exploit this flaw by manipulating the <code>standard</code> argument. The vulnerability can be triggered remotely, meaning an attacker does not need local access to the device. Given that a public exploit is available, this vulnerability poses a significant risk to users of the affected Tenda CH22 router. This allows unauthenticated attackers to potentially gain full control of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Tenda CH22 router version 1.0.0.1 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/CertLocalPrecreate</code> endpoint.</li>
<li>The attacker includes an overly long string as the value for the <code>standard</code> parameter in the HTTP request.</li>
<li>The Tenda CH22 router receives the malicious request and passes the <code>standard</code> parameter to the <code>formCertLocalPrecreate</code> function.</li>
<li>The <code>formCertLocalPrecreate</code> function copies the oversized <code>standard</code> argument into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions, including the return address of the function.</li>
<li>The attacker controls the overwritten return address to point to attacker-controlled code injected into memory, or to a Return-Oriented Programming (ROP) chain.</li>
<li>Upon function return, execution is redirected to the attacker&rsquo;s code, allowing them to execute arbitrary commands on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5604 allows a remote, unauthenticated attacker to execute arbitrary code on the Tenda CH22 router. This could lead to a complete compromise of the device, allowing the attacker to gain control over network traffic, modify router settings, or use the device as part of a botnet. Given the wide deployment of Tenda routers, a large number of devices could be vulnerable, making this a high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/CertLocalPrecreate</code> with unusually long <code>standard</code> parameters to identify potential exploit attempts (see rule: &ldquo;Detect Tenda CH22 Buffer Overflow Attempt via Long Standard Parameter&rdquo;).</li>
<li>Implement rate limiting on the <code>/goform/CertLocalPrecreate</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-5604.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda CH22 Router POST Request to CertLocalPrecreate&rdquo; to identify suspicious POST requests to the affected endpoint and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5604</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda M3 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-m3-overflow/</link><pubDate>Sun, 05 Apr 2026 13:17:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-m3-overflow/</guid><description>A buffer overflow vulnerability exists in Tenda M3 1.0.0.10 via manipulation of the policyType argument in the setAdvPolicyData function, allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability has been identified in Tenda M3 router version 1.0.0.10. The vulnerability resides in the <code>setAdvPolicyData</code> function within the <code>/goform/setAdvPolicyData</code> file, a part of the Destination Handler component. By manipulating the <code>policyType</code> argument, a remote attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations utilizing the affected Tenda M3 router, potentially allowing attackers to gain unauthorized access to the network or disrupt services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda M3 router exposed to the internet or reachable from their network position.</li>
<li>Attacker sends a crafted HTTP POST request to <code>/goform/setAdvPolicyData</code>.</li>
<li>The POST request includes a malicious <code>policyType</code> argument designed to overflow the buffer in the <code>setAdvPolicyData</code> function.</li>
<li>The <code>setAdvPolicyData</code> function in <code>/goform/setAdvPolicyData</code> processes the <code>policyType</code> argument without proper bounds checking.</li>
<li>The excessive data provided in the <code>policyType</code> argument overwrites adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite critical data or inject malicious code into the process&rsquo;s memory space.</li>
<li>The injected code is executed, giving the attacker control over the router.</li>
<li>The attacker can then use the compromised router as a foothold to pivot to other devices on the network, exfiltrate sensitive data, or cause denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda M3 router. This could lead to a complete compromise of the device, allowing the attacker to control network traffic, access sensitive information, or use the router as a launchpad for further attacks within the network. Given the severity and the existence of public exploits, vulnerable routers are at high risk of being targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-5567.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/setAdvPolicyData</code> with unusually long <code>policyType</code> arguments; deploy the Sigma rule <code>Detect Suspicious PolicyType Argument Length</code> to identify this activity.</li>
<li>Implement network segmentation to limit the potential impact of a compromised router.</li>
<li>Consider using a web application firewall (WAF) to filter malicious requests targeting the affected endpoint.</li>
<li>Review and restrict access to the router&rsquo;s management interface to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5567</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>webserver</category></item><item><title>Tenda AC10 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ac10-overflow/</link><pubDate>Sun, 05 Apr 2026 08:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ac10-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5550) in Tenda AC10 firmware version 16.03.10.10_multi_TDE01 within the /bin/httpd SysToolChangePwd function allows remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-5550, exists in Tenda AC10 router firmware version 16.03.10.10_multi_TDE01. The vulnerability is located in the <code>fromSysToolChangePwd</code> function within the <code>/bin/httpd</code> binary. A remote attacker can exploit this flaw to overwrite the stack and potentially execute arbitrary code on the affected device. This is achieved by sending a specially crafted request to the device. Successful exploitation could lead to complete system compromise, allowing attackers to gain unauthorized access, control the device, or use it as a foothold for further network intrusion. Given the widespread use of Tenda routers, this vulnerability poses a significant risk to home and small business networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda AC10 router running firmware version 16.03.10.10_multi_TDE01.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/bin/httpd</code> endpoint.</li>
<li>The malicious request is designed to overflow the buffer in the <code>fromSysToolChangePwd</code> function when processing the request parameters.</li>
<li>The overflow overwrites the stack with attacker-controlled data, including the return address.</li>
<li>The <code>httpd</code> process attempts to return from the <code>fromSysToolChangePwd</code> function.</li>
<li>Due to the overwritten return address, execution is redirected to the attacker&rsquo;s code.</li>
<li>The attacker&rsquo;s code executes with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains control of the device and can perform arbitrary actions, such as modifying router settings, executing commands, or establishing a backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5550 allows a remote attacker to gain complete control of the affected Tenda AC10 router. This can lead to data breaches, denial-of-service attacks, or the router being used as part of a botnet. Given the potential for widespread exploitation and the ease with which the vulnerability can be triggered, CVE-2026-5550 poses a high risk to users of the affected Tenda AC10 router model. The attacker could potentially monitor all network traffic passing through the device, steal sensitive information, or use the compromised device to launch attacks against other systems on the network or the internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/bin/httpd</code> with abnormally large parameter values that could indicate a buffer overflow attempt targeting the <code>fromSysToolChangePwd</code> function to trigger the vulnerability (see the related Sigma rule below).</li>
<li>Since a patch is not mentioned, consider replacing the affected Tenda AC10 device or isolating it from critical network segments if immediate replacement is not feasible.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5550</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda 4G03 Pro Improper Access Control Vulnerability (CVE-2026-5526)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-4g03-pro-access-control/</link><pubDate>Sat, 04 Apr 2026 23:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-4g03-pro-access-control/</guid><description>CVE-2026-5526 describes an improper access control vulnerability in the Tenda 4G03 Pro router's /bin/httpd file, allowing remote attackers to potentially gain unauthorized access.</description><content:encoded><![CDATA[<p>A security vulnerability, identified as CVE-2026-5526, affects the Tenda 4G03 Pro router, specifically versions up to 1.0/1.1/04.03.01.53/192.168.0.1. The flaw resides within an unspecified function of the <code>/bin/httpd</code> file, leading to improper access controls. A remote attacker could exploit this vulnerability, potentially gaining unauthorized access to the device. Publicly available exploits exist, increasing the risk of exploitation. This issue was reported on April 4, 2026, and poses a significant threat due to the ease of remote exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda 4G03 Pro router with a publicly accessible web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/bin/httpd</code> file.</li>
<li>The malicious request exploits the improper access control vulnerability (CVE-2026-5526).</li>
<li>The router&rsquo;s <code>/bin/httpd</code> process improperly handles the request, bypassing access controls.</li>
<li>The attacker gains unauthorized access to sensitive functionalities of the router.</li>
<li>The attacker modifies router configurations, such as DNS settings or firewall rules.</li>
<li>The attacker could potentially use the compromised router as a pivot point for further network attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5526 could allow attackers to remotely compromise Tenda 4G03 Pro routers. This can lead to unauthorized access to the device&rsquo;s configuration, modification of settings, or use of the router as a stepping stone for further attacks within the network. Given the availability of public exploits, unpatched devices are at significant risk. While the exact number of affected devices is unknown, the widespread use of Tenda routers makes this a potentially significant issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting <code>/bin/httpd</code> using the provided Sigma rule.</li>
<li>Apply available firmware updates or patches from Tenda to address CVE-2026-5526 as soon as they are released.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Enforce strong password policies for router administration to prevent unauthorized access.</li>
<li>Review and update firewall rules to restrict access to the router&rsquo;s web interface from untrusted networks.</li>
<li>Deploy the provided Sigma rule to detect suspicious process execution originating from the web server process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5526</category><category>tenda</category><category>router</category><category>access-control</category></item><item><title>Tenda CH22 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5204)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-bo/</link><pubDate>Tue, 31 Mar 2026 16:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5204) exists in the Tenda CH22 1.0.0.1 router, allowing remote attackers to execute arbitrary code by manipulating the webSiteId argument in the formWebTypeLibrary function.</description><content:encoded><![CDATA[<p>CVE-2026-5204 describes a critical stack-based buffer overflow vulnerability affecting Tenda CH22 router version 1.0.0.1. The vulnerability resides within the <code>formWebTypeLibrary</code> function in the <code>/goform/webtypelibrary</code> file, which handles web-based parameter input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the router, manipulating the <code>webSiteId</code> argument to overwrite the stack buffer. This allows for arbitrary code execution on the device. Given the router&rsquo;s role as a network gateway, successful exploitation can lead to complete compromise of the device and potentially the entire network behind it. The availability of a public exploit increases the risk of widespread exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/webtypelibrary</code> endpoint.</li>
<li>The crafted request includes the <code>webSiteId</code> parameter with a payload exceeding the expected buffer size, triggering the stack-based buffer overflow in the <code>formWebTypeLibrary</code> function.</li>
<li>The overflow overwrites critical data on the stack, including the return address.</li>
<li>The overwritten return address is replaced with the address of malicious code injected into the payload or a pre-existing code location within the router&rsquo;s firmware (Return-Oriented Programming - ROP).</li>
<li>The <code>formWebTypeLibrary</code> function returns, transferring control to the attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes, granting the attacker control over the device.</li>
<li>The attacker can then use this control to further compromise the network or disrupt services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5204 allows a remote attacker to execute arbitrary code on the vulnerable Tenda CH22 router. This can lead to complete control of the device, enabling the attacker to intercept network traffic, modify DNS settings, create VPNs, or launch further attacks on devices within the network. Given that routers are essential network devices, a successful attack can have a significant impact, affecting all connected devices and potentially exposing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates for Tenda CH22 routers immediately to patch CVE-2026-5204.</li>
<li>Deploy the Sigma rule <code>Tenda-CH22-WebSiteId-Buffer-Overflow</code> to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/webtypelibrary</code> with unusually long <code>webSiteId</code> parameters, as indicated by <code>WebSiteId_Length_Detection</code> Sigma rule.</li>
<li>Implement network segmentation to limit the impact of a potential router compromise.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5204</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Totolink A3300R Command Injection Vulnerability (CVE-2026-5176)</title><link>https://feed.craftedsignal.io/briefs/2026-03-totolink-cve-2026-5176/</link><pubDate>Tue, 31 Mar 2026 02:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-totolink-cve-2026-5176/</guid><description>A command injection vulnerability (CVE-2026-5176) exists in the setSyslogCfg function of the Totolink A3300R router version 17.0.0cu.557_b20221024, allowing remote attackers to execute arbitrary commands by manipulating arguments in the /cgi-bin/cstecgi.cgi file.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-5176, has been discovered in Totolink A3300R routers running firmware version 17.0.0cu.557_b20221024. The vulnerability resides within the <code>setSyslogCfg</code> function located in the <code>/cgi-bin/cstecgi.cgi</code> file. An unauthenticated, remote attacker can exploit this flaw by manipulating arguments passed to the vulnerable function. This manipulation results in the execution of arbitrary commands on the affected device. Given the public…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-5176</category><category>totolink</category><category>router</category></item><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-overflow/</link><pubDate>Tue, 31 Mar 2026 00:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1 via manipulation of the `mit_linktype` argument in the `/goform/QuickIndex` endpoint, potentially enabling remote code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda CH22 router version 1.0.0.1. The vulnerability resides within the <code>formQuickIndex</code> function of the <code>/goform/QuickIndex</code> file, which is a component of the Parameter Handler. This flaw can be triggered by manipulating the <code>mit_linktype</code> argument, leading to a buffer overflow on the stack. The vulnerability is remotely exploitable, meaning an attacker can trigger the flaw over the network without needing local access to the device. The existence of a public exploit further increases the risk of potential exploitation by malicious actors. Successful exploitation could allow an attacker to execute arbitrary code on the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/QuickIndex</code> endpoint.</li>
<li>The malicious request includes the <code>mit_linktype</code> argument with a payload exceeding the expected buffer size.</li>
<li>The Tenda CH22 router processes the HTTP request and passes the <code>mit_linktype</code> argument to the <code>formQuickIndex</code> function.</li>
<li>The <code>formQuickIndex</code> function copies the attacker-controlled <code>mit_linktype</code> data into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>Due to the oversized payload, the copy operation overflows the buffer, overwriting adjacent memory on the stack, including the return address.</li>
<li>The <code>formQuickIndex</code> function completes and attempts to return to the caller function.</li>
<li>Due to the overwritten return address, control is redirected to attacker-controlled code, enabling arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the Tenda CH22 router. This can lead to a variety of malicious outcomes, including complete device compromise, denial of service, and the potential to use the router as a launchpad for further attacks on the local network or the internet. Given that routers are often used in both home and small business environments, a successful attack could affect a wide range of users and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/QuickIndex</code> with unusually long <code>mit_linktype</code> parameters to detect potential exploitation attempts. Implement the Sigma rule <code>Detect Tenda CH22 mit_linktype Buffer Overflow Attempt</code> against web server logs.</li>
<li>Implement rate limiting on the <code>/goform/QuickIndex</code> endpoint to mitigate potential denial-of-service attacks stemming from exploitation.</li>
<li>Since the source material identifies CWE-119 and CWE-121 as root causes, review code practices related to buffer handling and implement stricter input validation procedures.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5156</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda CH22 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-buffer-overflow/</link><pubDate>Mon, 30 Mar 2026 23:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1/1.If allowing remote attackers to execute arbitrary code by manipulating the `funcname` argument in the `/goform/setcfm` endpoint.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-5154, has been discovered in Tenda CH22 firmware version 1.0.0.1/1.If. The vulnerability resides within the <code>fromSetCfm</code> function in the <code>/goform/setcfm</code> file, a component of the Parameter Handler. Successful exploitation allows remote attackers to execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to affected Tenda CH22 devices, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda CH22 device running firmware version 1.0.0.1/1.If.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setcfm</code> endpoint.</li>
<li>The request includes the <code>funcname</code> argument containing a string exceeding the buffer size allocated to it.</li>
<li>The <code>fromSetCfm</code> function processes the malicious <code>funcname</code> argument without proper bounds checking.</li>
<li>The oversized <code>funcname</code> value overflows the stack buffer, overwriting adjacent memory regions.</li>
<li>The attacker overwrites the return address on the stack with an address pointing to malicious code or a ROP chain.</li>
<li>The <code>fromSetCfm</code> function returns, causing execution to jump to the attacker-controlled address.</li>
<li>The attacker gains arbitrary code execution on the device, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the affected Tenda CH22 device. This can result in complete device compromise, allowing the attacker to control the device, steal sensitive information, or use the device as a foothold for further attacks on the network. Given the availability of public exploits, a large number of devices could be compromised if left unpatched.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/setcfm</code> with unusually long <code>funcname</code> parameters, using the provided Sigma rule.</li>
<li>Implement rate limiting on requests to <code>/goform/setcfm</code> to mitigate potential brute-force exploitation attempts.</li>
<li>Apply any available patches or firmware updates from Tenda to address CVE-2026-5154.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5154</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda FH1201 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5046)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-overflow/</link><pubDate>Sun, 29 Mar 2026 15:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5046) in Tenda FH1201 version 1.2.0.14(408) allows remote attackers to execute arbitrary code by manipulating the GO argument in the formWrlExtraSet function of the /goform/WrlExtraSet component.</description><content:encoded><![CDATA[<p>CVE-2026-5046 is a stack-based buffer overflow vulnerability affecting Tenda FH1201 routers running firmware version 1.2.0.14(408). The vulnerability resides within the <code>formWrlExtraSet</code> function of the <code>/goform/WrlExtraSet</code> component, specifically in the handling of the <code>GO</code> argument. A remote attacker can exploit this flaw by sending a crafted HTTP request with a maliciously oversized <code>GO</code> parameter, overwriting the stack and potentially gaining arbitrary code execution on the device. The…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5046</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-belkin-overflow/</link><pubDate>Sun, 29 Mar 2026 13:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-belkin-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5044) in Belkin F9K1122 version 1.00.33 allows remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the formSetSystemSettings function, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-5044, has been identified in Belkin F9K1122 router version 1.00.33. The vulnerability resides within the <code>formSetSystemSettings</code> function of the <code>/goform/formSetSystemSettings</code> file, which is part of the Setting Handler component. Successful exploitation allows a remote attacker to trigger a stack-based buffer overflow by manipulating the <code>webpage</code> argument. This could result in arbitrary code execution on the device. Publicly available exploit code…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5044</category><category>buffer-overflow</category><category>belkin</category><category>router</category></item><item><title>Belkin F9K1122 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-belkin-buffer-overflow/</link><pubDate>Sun, 29 Mar 2026 11:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-belkin-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5042) exists in the Belkin F9K1122 router version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the webpage argument in the formCrossBandSwitch function.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-5042, has been discovered in Belkin F9K1122 routers running firmware version 1.00.33. The vulnerability resides within the <code>formCrossBandSwitch</code> function of the <code>/goform/formCrossBandSwitch</code> file, a component of the Parameter Handler. Successful exploitation could allow a remote, unauthenticated attacker to execute arbitrary code on the device. Publicly available exploit code increases the risk of widespread…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5042</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda 4G06 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5036)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-4g06-bo/</link><pubDate>Sun, 29 Mar 2026 08:15:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-4g06-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5036) exists in the fromDhcpListClient function of the Tenda 4G06 router (version 04.06.01.29), potentially allowing remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/DhcpListClient endpoint.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-5036, affects the Tenda 4G06 router, specifically version 04.06.01.29. The vulnerability resides in the <code>fromDhcpListClient</code> function within the <code>/goform/DhcpListClient</code> endpoint. A remote attacker can exploit this by crafting a malicious request that manipulates the <code>page</code> argument, leading to a buffer overflow on the stack. This could allow the attacker to potentially execute arbitrary code on the device. Given the…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5036</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item><item><title>Tenda F453 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5021)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-f453-overflow/</link><pubDate>Sun, 29 Mar 2026 02:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-f453-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda F453 1.0.0.3 allows a remote attacker to execute arbitrary code by manipulating the 'delno' argument in the fromPPTPUserSetting function of the /goform/PPTPUserSetting component's httpd process.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-5021, has been discovered in Tenda F453 router version 1.0.0.3. This vulnerability resides within the <code>fromPPTPUserSetting</code> function of the <code>/goform/PPTPUserSetting</code> component, specifically in the <code>httpd</code> process. The vulnerability can be triggered by manipulating the <code>delno</code> argument. Successful exploitation allows remote attackers to potentially execute arbitrary code on the affected device. Publicly available exploit code…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5021</category><category>buffer-overflow</category><category>router</category></item><item><title>Wavlink WL-WN579X3-C Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-wavlink-overflow/</link><pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wavlink-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Wavlink WL-WN579X3-C 231124's UPNP Handler component, specifically in the /cgi-bin/firewall.cgi file and the sub_4019FC function, allowing remote attackers to execute arbitrary code by manipulating the UpnpEnabled argument; public exploits are available, but the vendor has not responded to the disclosure.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5004, affects the Wavlink WL-WN579X3-C 231124 router. The vulnerability lies within the UPNP Handler component, specifically the <code>/cgi-bin/firewall.cgi</code> file&rsquo;s <code>sub_4019FC</code> function. By manipulating the <code>UpnpEnabled</code> argument, a remote attacker can trigger a stack-based buffer overflow. This can lead to arbitrary code execution on the device. Public exploits for this vulnerability are available, increasing the risk of widespread exploitation. Despite responsible disclosure attempts, the vendor has not provided a patch or response, leaving users vulnerable. This is a significant concern for network security, especially for devices exposed to the internet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Wavlink WL-WN579X3-C 231124 router exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/cgi-bin/firewall.cgi</code>.</li>
<li>The HTTP request includes a manipulated <code>UpnpEnabled</code> argument designed to overflow the buffer in the <code>sub_4019FC</code> function.</li>
<li>The vulnerable <code>sub_4019FC</code> function processes the <code>UpnpEnabled</code> argument without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory on the stack, including the return address.</li>
<li>The overwritten return address points to attacker-controlled code.</li>
<li>Upon function return, execution jumps to the attacker-controlled code, allowing arbitrary commands to be executed.</li>
<li>The attacker gains remote code execution, potentially allowing complete control of the device, including network access and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5004 allows a remote attacker to execute arbitrary code on the vulnerable Wavlink WL-WN579X3-C 231124 router. This could lead to complete device compromise, including unauthorized network access, data exfiltration, and the potential use of the router as a botnet node. Given the availability of public exploits, a widespread exploitation is possible, affecting potentially thousands of devices. The lack of vendor response exacerbates the risk, as no official patch is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Firewall CGI Requests</code> to your SIEM and tune for your environment to identify potential exploitation attempts targeting the <code>/cgi-bin/firewall.cgi</code> endpoint.</li>
<li>Deploy the Sigma rule <code>Detect UPNP Enabled Overflow</code> to detect possible overflows.</li>
<li>Monitor web server logs for requests to <code>/cgi-bin/firewall.cgi</code> with unusually long <code>UpnpEnabled</code> parameters.</li>
<li>If possible, isolate Wavlink WL-WN579X3-C 231124 routers from direct internet exposure until a patch is available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda AC15 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4975)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac15-bo/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac15-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4975) exists in the Tenda AC15 router version 15.03.05.19, allowing remote attackers to execute arbitrary code by manipulating the 'funcpara1' argument in a POST request to /goform/setcfm.</description><content:encoded><![CDATA[<p>CVE-2026-4975 is a critical security vulnerability affecting Tenda AC15 routers running firmware version 15.03.05.19. This vulnerability resides in the <code>formSetCfm</code> function, specifically within the <code>/goform/setcfm</code> file, which handles POST requests. An attacker can exploit a stack-based buffer overflow by sending a crafted POST request with a malicious payload in the <code>funcpara1</code> argument. The vulnerability is remotely exploitable, meaning an attacker does not need local access to the device…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer overflow</category><category>cve-2026-4975</category></item><item><title>Totolink LR350 Remote Buffer Overflow Vulnerability (CVE-2026-4976)</title><link>https://feed.craftedsignal.io/briefs/2026-03-totolink-buffer-overflow/</link><pubDate>Fri, 27 Mar 2026 21:17:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-totolink-buffer-overflow/</guid><description>A buffer overflow vulnerability in Totolink LR350 version 9.3.5u.6369_B20220309 allows a remote attacker to execute arbitrary code by manipulating the 'ssid' argument in the setWiFiGuestCfg function.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-4976, has been identified in Totolink LR350 routers running firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the <code>setWiFiGuestCfg</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file. By crafting a malicious HTTP request and manipulating the <code>ssid</code> argument, a remote, unauthenticated attacker can trigger a buffer overflow, potentially leading to arbitrary code execution on the device. The availability of a public exploit…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4976</category><category>buffer-overflow</category><category>totolink</category><category>router</category><category>remote-code-execution</category></item><item><title>Tenda AC7 Stack-Based Buffer Overflow in SetSysTimeCfg</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac7-overflow/</link><pubDate>Fri, 27 Mar 2026 20:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac7-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda AC7 version 15.03.06.44 within the fromSetSysTime function of the /goform/SetSysTimeCfg component's POST Request Handler, allowing a remote attacker to potentially execute arbitrary code by manipulating the 'Time' argument.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda AC7 router firmware, specifically version 15.03.06.44. The vulnerability resides in the <code>fromSetSysTime</code> function within the <code>/goform/SetSysTimeCfg</code> component, which handles POST requests. A remote attacker can exploit this flaw by crafting a malicious POST request with an overly long <code>Time</code> argument, causing a buffer overflow on the stack. Publicly available exploits exist, increasing the risk of exploitation. Successful exploitation could lead to arbitrary code execution on the device, potentially granting the attacker complete control over the router. This is a critical vulnerability due to the ease of remote exploitation and the potential for significant impact.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda AC7 router running firmware version 15.03.06.44.</li>
<li>Attacker crafts a POST request targeting the <code>/goform/SetSysTimeCfg</code> endpoint.</li>
<li>The POST request includes the <code>Time</code> argument, set to a string exceeding the expected buffer size.</li>
<li>The <code>fromSetSysTime</code> function processes the <code>Time</code> argument without proper bounds checking.</li>
<li>The overly long <code>Time</code> argument overflows the stack buffer during the copy operation.</li>
<li>The buffer overflow overwrites critical data on the stack, including the return address.</li>
<li>The attacker controls the overwritten return address, redirecting execution flow to malicious code.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda AC7 router. This can lead to a variety of malicious outcomes, including complete device compromise, modification of router settings (DNS, firewall rules), interception of network traffic, and use of the router as a botnet node. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, potentially impacting home users and small businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-4974.</li>
<li>Monitor webserver logs for POST requests to <code>/goform/SetSysTimeCfg</code> with abnormally long <code>Time</code> parameters, using the Sigma rule provided below.</li>
<li>Implement rate limiting on the <code>/goform/SetSysTimeCfg</code> endpoint to mitigate brute-force attempts to exploit the vulnerability.</li>
<li>Deploy the Sigma rule to detect processes spawned by the webserver after the exploit is triggered.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda AC6 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac6-overflow/</link><pubDate>Fri, 27 Mar 2026 17:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac6-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda AC6 version 15.03.05.16 allows remote attackers to execute arbitrary code by manipulating the WANT/WANS argument in the /goform/WizardHandle POST request handler.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda AC6 router firmware version 15.03.05.16. The vulnerability, tracked as CVE-2026-4960, resides within the <code>fromWizardHandle</code> function of the <code>/goform/WizardHandle</code> component, which handles POST requests. A remote attacker can exploit this vulnerability by sending a crafted POST request with a manipulated <code>WANT</code> or <code>WANS</code> argument, leading to arbitrary code execution on the device. Public exploit code is available, increasing the risk of widespread exploitation. This vulnerability poses a significant threat, potentially allowing attackers to gain complete control over vulnerable routers and compromise connected networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda AC6 router running firmware version 15.03.05.16.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/goform/WizardHandle</code> endpoint.</li>
<li>Within the POST request, the attacker manipulates the <code>WANT</code> or <code>WANS</code> argument to inject a payload exceeding the buffer size.</li>
<li>The router processes the POST request, passing the attacker-controlled input to the vulnerable <code>fromWizardHandle</code> function.</li>
<li>The overflow occurs when the <code>fromWizardHandle</code> function copies the attacker-supplied data into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>The injected payload overwrites adjacent memory locations on the stack, including the return address.</li>
<li>When the <code>fromWizardHandle</code> function returns, it jumps to the attacker-controlled address.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the affected Tenda AC6 router. This can lead to a variety of malicious outcomes, including network hijacking, DNS poisoning, interception of network traffic, deployment of malware, and the creation of botnets. Given the widespread use of Tenda routers in home and small business networks, a large number of devices are potentially vulnerable. The CVSS v3.1 score of 8.8 reflects the high severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-4960.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/WizardHandle</code> with abnormally long <code>WANT</code> or <code>WANS</code> parameters using the Sigma rule provided below.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect exploit attempts targeting the <code>/goform/WizardHandle</code> endpoint.</li>
<li>Restrict access to the router&rsquo;s web interface from the public internet where possible to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4960</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda AC5 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-overflow/</link><pubDate>Fri, 27 Mar 2026 00:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4905) exists in Tenda AC5 firmware version 15.03.06.47 allowing remote attackers to execute arbitrary code by manipulating the 'index' argument in a POST request to the /goform/WifiWpsOOB endpoint.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-4905, has been discovered in Tenda AC5 home routers running firmware version 15.03.06.47. The vulnerability resides within the <code>formWifiWpsOOB</code> function in the <code>/goform/WifiWpsOOB</code> file, which handles POST requests. Attackers can remotely exploit this flaw by crafting a malicious POST request to this endpoint, specifically targeting the <code>index</code> argument. Successful exploitation leads to arbitrary code execution on the device…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>cve-2026-4905</category></item><item><title>Netcore Power 15AX Remote Command Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-netcore-rce/</link><pubDate>Thu, 26 Mar 2026 05:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-netcore-rce/</guid><description>CVE-2026-4840 is a critical command injection vulnerability in the Netcore Power 15AX router that allows remote attackers to execute arbitrary OS commands by manipulating the IpAddr argument in the setTools function of the /bin/netis.cgi file.</description><content:encoded><![CDATA[<p>A remote command execution vulnerability, CVE-2026-4840, affects Netcore Power 15AX devices with firmware versions up to 3.0.0.6938. The vulnerability resides in the Diagnostic Tool Interface, specifically within the <code>setTools</code> function of the <code>/bin/netis.cgi</code> file. By manipulating the <code>IpAddr</code> argument, an attacker can inject and execute arbitrary operating system commands on the device. This vulnerability poses a significant risk, as it allows unauthenticated remote attackers to gain complete…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>vulnerability</category><category>netcore</category><category>router</category></item><item><title>D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)</title><link>https://feed.craftedsignal.io/briefs/2026-03-dlink-command-injection/</link><pubDate>Tue, 24 Mar 2026 05:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-dlink-command-injection/</guid><description>CVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.</description><content:encoded><![CDATA[<p>CVE-2026-4627 is an OS command injection vulnerability affecting D-Link DIR-825 and DIR-825R routers, specifically versions 1.0.5 and 4.5.1. The vulnerability resides within the <code>handler_update_system_time</code> function of the <code>libdeuteron_modules.so</code> file, which is part of the NTP service. An attacker with administrative privileges can inject arbitrary OS commands by manipulating the input to this function. The vulnerability can be exploited remotely, allowing a threat actor to potentially gain…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>legacy-device</category></item><item><title>Tenda F453 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-4553)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-stack-overflow/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-stack-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda F453 version 1.0.0.3 in the fromNatlimit function of the /goform/Natlimit Parameters Handler component, triggered remotely by manipulating the 'page' argument, allowing for potential arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, tracked as CVE-2026-4553, has been identified in Tenda F453 version 1.0.0.3. The flaw resides within the <code>fromNatlimit</code> function of the <code>/goform/Natlimit</code> component&rsquo;s Parameters Handler. Publicly available exploits exist, increasing the risk of exploitation. Successful exploitation could allow an attacker to execute arbitrary code on the affected device. This vulnerability poses a significant threat to users of the Tenda F453 router, potentially…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4553</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda A15 Router Stack-Based Buffer Overflow (CVE-2026-4567)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-a15-bo/</link><pubDate>Mon, 23 Mar 2026 03:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-a15-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4567) exists in the UploadCfg function of the /cgi-bin/UploadCfg file in Tenda A15 firmware version 15.13.07.13, allowing remote attackers to execute arbitrary code by manipulating the File argument.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-4567, has been discovered in Tenda A15 wireless routers running firmware version 15.13.07.13. The vulnerability resides in the <code>UploadCfg</code> function within the <code>/cgi-bin/UploadCfg</code> file, which handles file uploads.  A remote attacker can exploit this flaw by crafting a malicious request to the router, specifically targeting the <code>File</code> argument, to overwrite the stack buffer and potentially gain arbitrary code execution…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4567</category><category>stack-based buffer overflow</category><category>tenda</category><category>router</category><category>remote code execution</category></item><item><title>Belkin F9K1122 Router Stack-Based Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-03-belkin-rce/</link><pubDate>Mon, 23 Mar 2026 03:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-belkin-rce/</guid><description>A stack-based buffer overflow vulnerability exists in Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWISP5G' function.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been discovered in the Belkin F9K1122 router, specifically version 1.00.33. The vulnerability resides within the <code>formWISP5G</code> function located in the <code>/goform/formWISP5G</code> file. Successful exploitation involves manipulating the <code>webpage</code> argument, leading to arbitrary code execution. This vulnerability is remotely exploitable, making it a significant threat. Publicly available exploit code exists, increasing the likelihood of exploitation. The vendor was notified but has not responded, indicating a lack of timely patching. This poses a high risk to users of the affected Belkin router model.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Belkin F9K1122 router running firmware version 1.00.33.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/formWISP5G</code> endpoint.</li>
<li>Within the HTTP request, the <code>webpage</code> argument is manipulated to contain a payload exceeding the buffer size.</li>
<li>The router&rsquo;s web server processes the request and passes the attacker-controlled input to the <code>formWISP5G</code> function.</li>
<li>The <code>formWISP5G</code> function attempts to copy the oversized <code>webpage</code> argument into a fixed-size buffer on the stack.</li>
<li>A stack-based buffer overflow occurs, overwriting adjacent memory regions, including the return address.</li>
<li>The attacker gains control of the program execution flow by redirecting it to attacker-controlled code.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining complete control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Belkin F9K1122 router. This can lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the router as a pivot point for further attacks within the network. Given the wide use of these routers in home and small business environments, a successful widespread attack could impact thousands of users. The absence of a vendor patch exacerbates the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement a web application firewall (WAF) rule to detect and block requests with excessively long <code>webpage</code> arguments to the <code>/goform/formWISP5G</code> endpoint, mitigating exploitation attempts (Attack Chain step 3).</li>
<li>Deploy the Sigma rule provided to detect suspicious web requests targeting the vulnerable endpoint (see &ldquo;Belkin Router RCE Attempt&rdquo; rule).</li>
<li>Monitor web server logs for unusual activity related to the <code>/goform/formWISP5G</code> endpoint (Attack Chain step 4).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4566</category><category>buffer-overflow</category><category>router</category><category>rce</category></item><item><title>Tenda AC21 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac21-buffer-overflow/</link><pubDate>Mon, 23 Mar 2026 01:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac21-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Tenda AC21 firmware version 16.03.08.16, allowing remote attackers to execute arbitrary code by manipulating arguments to the formSetQosBand function.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-4565, affects Tenda AC21 routers running firmware version 16.03.08.16. The flaw resides in the <code>formSetQosBand</code> function within the <code>/goform/SetNetControlList</code> file. Attackers can exploit this vulnerability by crafting malicious argument lists in HTTP requests, leading to arbitrary code execution on the device. The vulnerability can be exploited remotely and a proof-of-concept exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation allows attackers to gain complete control over the router, potentially compromising connected devices and network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda AC21 router with firmware version 16.03.08.16.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SetNetControlList</code> endpoint.</li>
<li>The POST request includes a specially crafted argument list designed to overflow the buffer in the <code>formSetQosBand</code> function.</li>
<li>The router processes the HTTP request and passes the malicious arguments to the vulnerable function.</li>
<li>The <code>formSetQosBand</code> function attempts to copy the oversized argument list into a fixed-size buffer, triggering a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>The attacker gains control of the program execution flow and injects malicious code.</li>
<li>The injected code executes with elevated privileges, granting the attacker complete control over the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Tenda AC21 router. This can lead to a variety of malicious outcomes, including: complete device compromise, modification of router settings, interception of network traffic, deployment of malware to connected devices, and use of the router as a botnet node. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploit could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/SetNetControlList</code> with unusually long or malformed arguments (see rule: &ldquo;Detect Suspicious POST Requests to SetNetControlList&rdquo;).</li>
<li>Implement rate limiting on HTTP POST requests to prevent attackers from quickly exploiting the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda AC21 Buffer Overflow Attempt&rdquo; to identify exploitation attempts based on specific patterns in HTTP requests.</li>
<li>Consider blocking traffic from known exploit sources, if available.</li>
<li>Upgrade to a patched firmware version as soon as it becomes available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>ac21</category><category>buffer_overflow</category><category>cve-2026-4565</category><category>router</category></item><item><title>Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)</title><link>https://feed.craftedsignal.io/briefs/2026-02-zyxel-rce/</link><pubDate>Fri, 27 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-zyxel-rce/</guid><description>A critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.</description><content:encoded>&lt;p>A critical command injection vulnerability, tracked as CVE-2026-13942, has been discovered in the UPnP (Universal Plug and Play) service of Zyxel routers. The vulnerability stems from insufficient validation of input within the UPnP SOAP request processing.  An unauthenticated, remote attacker can exploit this flaw by sending specially crafted UPnP SOAP requests to the affected device. This allows the attacker to inject and execute arbitrary operating system commands with elevated privileges on…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>zyxel</category><category>router</category><category>command injection</category><category>cve-2026-13942</category><category>upnp</category></item><item><title>Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-hg3-command-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-hg3-command-injection/</guid><description>A command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, identified as CVE-2026-7096, affects Tenda HG3 2.0 300003070 routers. The vulnerability resides in the &lsquo;formgponConf&rsquo; function within the &lsquo;/boaform/admin/formgponConf&rsquo; file. An attacker can exploit this flaw by manipulating the &lsquo;fmgpon_loid&rsquo; argument. Successful exploitation allows a remote attacker to execute arbitrary operating system commands on the affected device. Given the public availability of an exploit, Tenda HG3 devices are at immediate risk of compromise. This poses a significant threat as attackers can potentially gain full control of the router, compromise connected networks, and exfiltrate sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 300003070 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the &lsquo;/boaform/admin/formgponConf&rsquo; endpoint.</li>
<li>The attacker injects a payload containing OS commands into the &lsquo;fmgpon_loid&rsquo; parameter of the POST request.</li>
<li>The Tenda HG3 router&rsquo;s web server processes the request without proper input validation of the &lsquo;fmgpon_loid&rsquo; parameter.</li>
<li>The injected OS command is executed by the router&rsquo;s operating system with the privileges of the web server process.</li>
<li>The attacker gains remote code execution on the Tenda HG3 router.</li>
<li>The attacker may establish a reverse shell to maintain persistent access or download further malicious payloads.</li>
<li>The attacker can then pivot to internal networks, exfiltrate data, or use the compromised router for other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7096 grants attackers the ability to execute arbitrary OS commands on the Tenda HG3 router. This can lead to complete compromise of the device, allowing attackers to modify router settings, intercept network traffic, and potentially gain access to connected devices on the local network. Given the widespread use of Tenda routers in home and small business environments, a successful attack could impact thousands of users. The vulnerability&rsquo;s high CVSS score of 8.8 underscores the severity and potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo; to your SIEM to identify exploitation attempts by monitoring HTTP POST requests to &lsquo;/boaform/admin/formgponConf&rsquo; with suspicious commands in the &lsquo;fmgpon_loid&rsquo; parameter.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect malicious payloads in HTTP POST requests targeting the vulnerable endpoint, as described in the &ldquo;Attack Chain&rdquo; section.</li>
<li>While no specific IOCs are provided, analyze network traffic and web server logs for unusual activity originating from or targeting Tenda HG3 routers.</li>
<li>Monitor web server logs for HTTP POST requests to /boaform/admin/formgponConf (described in Attack Chain step 2).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>tenda</category></item><item><title>Tenda FH1202 Stack-Based Buffer Overflow Vulnerability (CVE-2026-7034)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-fh1202-bo/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-fh1202-bo/</guid><description>A stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically in the WrlExtraSet function, allowing remote attackers to execute arbitrary code by manipulating the 'Go' argument in a request to /goform/WrlExtraSet.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-7034, has been discovered in Tenda FH1202 version 1.2.0.14(408). The vulnerability resides within the <code>WrlExtraSet</code> function of the <code>/goform/WrlExtraSet</code> component, which is part of the device&rsquo;s <code>httpd</code> server. A remote attacker can exploit this vulnerability by crafting a malicious HTTP request that manipulates the <code>Go</code> argument, leading to arbitrary code execution on the affected device. The exploit for this vulnerability has been made public, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to users of the Tenda FH1202 router as it allows for complete compromise of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda FH1202 router exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlExtraSet</code> endpoint.</li>
<li>The crafted request includes a <code>Go</code> parameter with a payload exceeding the expected buffer size, triggering the stack-based buffer overflow.</li>
<li>The overflow overwrites critical return addresses on the stack.</li>
<li>The overwritten return address is redirected to malicious code injected by the attacker within the overflowed buffer.</li>
<li>The injected code executes with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains complete control of the device, potentially allowing for the installation of malware, modification of router settings, or interception of network traffic.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the Tenda FH1202 router. This can lead to a variety of malicious activities, including installing persistent backdoors, modifying DNS settings to redirect traffic, or using the compromised device as part of a botnet. The lack of required authentication for exploitation increases the severity, making it easily exploitable. While the exact number of affected devices is unknown, the widespread use of Tenda routers suggests a potentially large number of vulnerable targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/WrlExtraSet</code> with unusually long <code>Go</code> parameter values to detect potential exploitation attempts. Reference the Sigma rule <code>Detect Suspicious WrlExtraSet Requests</code>.</li>
<li>Implement rate limiting for requests to the <code>/goform/WrlExtraSet</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Consider blocking or alerting on requests to <code>/goform/WrlExtraSet</code> originating from outside the expected user base (e.g., requests originating from outside the country where the organization operates).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7034</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item><item><title>Tenda F456 Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-f456-buffer-overflow/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-f456-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 via manipulation of the 'page' argument in the fromDhcpListClient function of the /goform/DhcpListClient component, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7098, has been discovered in Tenda F456 router version 1.0.0.5. The vulnerability resides within the <code>fromDhcpListClient</code> function of the <code>/goform/DhcpListClient</code> component&rsquo;s <code>httpd</code> service. An attacker can exploit this flaw by remotely manipulating the <code>page</code> argument, leading to a buffer overflow. Publicly available exploit code exists, increasing the risk of widespread exploitation. Successful exploitation could allow an attacker to execute arbitrary code on the device, potentially gaining full control of the router and the network it serves. This poses a significant threat to home and small business users relying on these routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F456 router (version 1.0.0.5) accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/DhcpListClient</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a payload designed to overflow the buffer in the <code>fromDhcpListClient</code> function.</li>
<li>The <code>httpd</code> service processes the request and calls the <code>fromDhcpListClient</code> function.</li>
<li>Due to insufficient bounds checking, the oversized payload overwrites the buffer, potentially overwriting adjacent memory regions.</li>
<li>The attacker&rsquo;s payload overwrites the return address on the stack with a pointer to attacker-controlled code.</li>
<li>The <code>fromDhcpListClient</code> function returns, causing execution to jump to the attacker-controlled code.</li>
<li>The attacker-controlled code executes with the privileges of the <code>httpd</code> service, potentially allowing for full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can allow a remote attacker to execute arbitrary code on the Tenda F456 router. This could lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the router as a pivot point for further attacks within the network. Given the ease of exploitation and public availability of exploit code, a large number of Tenda F456 users are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests to <code>/goform/DhcpListClient</code> with unusually long <code>page</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Tenda F456 Buffer Overflow Attempt&rdquo;).</li>
<li>Implement rate limiting on requests to the <code>/goform/DhcpListClient</code> endpoint to mitigate the impact of potential attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda F456 Buffer Overflow Response&rdquo; to identify successful exploitation attempts based on server response codes.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7098</category><category>buffer-overflow</category><category>router</category></item></channel></rss>