<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Stack-Based-Buffer-Overflow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/stack-based-buffer-overflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 22:16:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/stack-based-buffer-overflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5686)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-stack-overflow/</link><pubDate>Mon, 06 Apr 2026 22:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-stack-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5686) exists in the Tenda CX12L router version 16.03.53.12, allowing remote attackers to potentially execute arbitrary code by manipulating the 'page' argument in the `/goform/RouteStatic` endpoint.</description><content:encoded><![CDATA[<p>CVE-2026-5686 is a critical vulnerability affecting Tenda CX12L routers running firmware version 16.03.53.12. This stack-based buffer overflow is located in the <code>fromRouteStatic</code> function within the <code>/goform/RouteStatic</code> file. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request with a malicious <code>page</code> argument. Publicly available exploit code exists, increasing the risk of widespread exploitation. Successful exploitation could lead to arbitrary code execution, potentially allowing attackers to gain full control of the affected router. This poses a significant risk to home and small business networks using the vulnerable device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda CX12L router running firmware version 16.03.53.12.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/goform/RouteStatic</code>.</li>
<li>The request includes a <code>page</code> argument with a string exceeding the buffer size allocated to the <code>fromRouteStatic</code> function.</li>
<li>The oversized <code>page</code> argument overwrites adjacent memory on the stack, including the return address.</li>
<li>When the <code>fromRouteStatic</code> function returns, it attempts to jump to the overwritten return address controlled by the attacker.</li>
<li>The attacker&rsquo;s payload, injected via the overflowed buffer, is executed with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains remote code execution on the router.</li>
<li>The attacker can then use the compromised router as a foothold for further attacks, such as network reconnaissance, lateral movement, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5686 allows a remote attacker to execute arbitrary code on the affected Tenda CX12L router. This could lead to a complete compromise of the device, enabling attackers to modify router settings, intercept network traffic, or use the router as a proxy for malicious activities. Given the widespread use of Tenda routers in home and small business networks, this vulnerability could have a significant impact, potentially affecting thousands of users. A successful attack could lead to data breaches, service disruptions, and further compromise of connected devices within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-5686.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/RouteStatic</code> with unusually long <code>page</code> parameters, using the provided Sigma rule.</li>
<li>Implement network intrusion detection systems (IDS) to detect and block exploit attempts targeting this vulnerability.</li>
<li>Restrict access to the router&rsquo;s administrative interface to trusted networks or IP addresses to limit the attack surface.</li>
<li>Regularly review router configurations and security settings to ensure they align with best practices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5686</category><category>tenda</category><category>router</category><category>stack-based buffer overflow</category><category>remote code execution</category></item><item><title>CVE-2025-47391 Qualcomm Memory Corruption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2025-47391/</link><pubDate>Mon, 06 Apr 2026 16:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2025-47391/</guid><description>CVE-2025-47391 is a memory corruption vulnerability due to a stack-based buffer overflow (CWE-121) while processing a frame request, as detailed in the Qualcomm security bulletin for April 2026, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2025-47391 is a critical memory corruption vulnerability affecting Qualcomm products. The vulnerability stems from a stack-based buffer overflow (CWE-121) triggered during the processing of a frame request. The vulnerability is detailed in the Qualcomm Security Bulletin for April 2026. A successful exploit could lead to arbitrary code execution within the context of the affected process. This vulnerability poses a significant risk to devices utilizing vulnerable Qualcomm components, potentially allowing attackers to gain unauthorized access and control. Defenders should prioritize identifying affected devices and applying necessary patches as soon as they become available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since no specific exploit details are provided in the source, the following attack chain describes the general steps involved in exploiting a stack-based buffer overflow when processing a frame request.</p>
<ol>
<li>An attacker crafts a malicious frame request.</li>
<li>The frame request is sent to the vulnerable Qualcomm component.</li>
<li>The component&rsquo;s software processes the frame request.</li>
<li>A stack-based buffer overflow occurs due to insufficient bounds checking when handling the request.</li>
<li>The attacker overwrites adjacent memory on the stack, including return addresses.</li>
<li>Upon function return, execution is redirected to attacker-controlled code.</li>
<li>The attacker executes arbitrary code, potentially gaining control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-47391 can lead to arbitrary code execution, potentially allowing an attacker to gain complete control over the affected device. Given the widespread use of Qualcomm components in mobile devices and other embedded systems, the impact could be significant, affecting a large number of users. The memory corruption vulnerability could allow for data theft, device compromise, and denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for suspicious frame requests targeting Qualcomm-based devices, and deploy the network connection rule below to detect unusual outbound activity after potential exploitation.</li>
<li>Analyze process memory for unusual code execution patterns, and implement the process creation rule to detect unexpected processes being launched.</li>
<li>Review and apply the security updates provided in the Qualcomm Security Bulletin for April 2026 to patch CVE-2025-47391.</li>
<li>Monitor for registry modifications indicative of persistence, using the registry_set rule below to detect unusual registry changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2025-47391</category><category>memory corruption</category><category>qualcomm</category><category>stack-based buffer overflow</category></item><item><title>V-SFT v6.2.10.0 Stack-Based Buffer Overflow (CVE-2026-32925)</title><link>https://feed.craftedsignal.io/briefs/2026-04-v-sft-buffer-overflow/</link><pubDate>Wed, 01 Apr 2026 23:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-v-sft-buffer-overflow/</guid><description>V-SFT versions 6.2.10.0 and prior are vulnerable to a stack-based buffer overflow (CVE-2026-32925) in the VS6ComFile!CV7BaseMap::WriteV7DataToRom function, potentially leading to arbitrary code execution when processing a crafted V7 file.</description><content:encoded><![CDATA[<p>V-SFT versions 6.2.10.0 and earlier are susceptible to a critical stack-based buffer overflow vulnerability identified as CVE-2026-32925. This flaw resides within the <code>VS6ComFile!CV7BaseMap::WriteV7DataToRom</code> function. The vulnerability is triggered when the software processes a specially crafted V7 file. A successful exploit could allow an attacker to execute arbitrary code within the context of the application. This poses a significant risk to systems utilizing affected versions of V-SFT, as it could lead to complete system compromise. The vulnerability was reported to JPCERT/CC and assigned CWE-121, highlighting the classic stack-based buffer overflow nature of the issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious V7 file designed to exploit the buffer overflow in <code>VS6ComFile!CV7BaseMap::WriteV7DataToRom</code>.</li>
<li>The user opens the malicious V7 file using a vulnerable version of V-SFT (6.2.10.0 or prior).</li>
<li>V-SFT attempts to parse the V7 file, specifically calling the <code>CV7BaseMap::WriteV7DataToRom</code> function.</li>
<li>During the <code>WriteV7DataToRom</code> function execution, the crafted V7 file provides input that exceeds the buffer size allocated on the stack.</li>
<li>The excessive input overwrites adjacent memory locations on the stack, including the return address.</li>
<li>Upon completion of the <code>WriteV7DataToRom</code> function, control is transferred to the overwritten return address.</li>
<li>The attacker redirects code execution to a location containing malicious code injected into the process memory.</li>
<li>The injected code executes with the privileges of the V-SFT application, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32925 allows an attacker to execute arbitrary code on systems running vulnerable versions of V-SFT (6.2.10.0 and prior). This could result in complete system compromise, data theft, or denial of service. The exact number of potential victims is unknown, but the severity is high due to the potential for arbitrary code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a non-vulnerable version of V-SFT as provided by the vendor (Fujielectric). Refer to the vendor advisory (<a href="https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb">https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb</a>).</li>
<li>Monitor process creation events for V-SFT spawning unusual child processes, which might indicate successful code execution. Utilize the Sigma rule &ldquo;Detect Suspicious V-SFT Child Processes&rdquo; to identify such behavior.</li>
<li>Implement file integrity monitoring for the V-SFT executable and related libraries to detect unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-32925</category><category>stack-based-buffer-overflow</category><category>v-sft</category></item><item><title>Tenda A15 Router Stack-Based Buffer Overflow (CVE-2026-4567)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-a15-bo/</link><pubDate>Mon, 23 Mar 2026 03:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-a15-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4567) exists in the UploadCfg function of the /cgi-bin/UploadCfg file in Tenda A15 firmware version 15.13.07.13, allowing remote attackers to execute arbitrary code by manipulating the File argument.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-4567, has been discovered in Tenda A15 wireless routers running firmware version 15.13.07.13. The vulnerability resides in the <code>UploadCfg</code> function within the <code>/cgi-bin/UploadCfg</code> file, which handles file uploads.  A remote attacker can exploit this flaw by crafting a malicious request to the router, specifically targeting the <code>File</code> argument, to overwrite the stack buffer and potentially gain arbitrary code execution…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4567</category><category>stack-based buffer overflow</category><category>tenda</category><category>router</category><category>remote code execution</category></item></channel></rss>