<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tenda — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/tenda/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 03:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/tenda/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda 4G300 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</link><pubDate>Thu, 30 Apr 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</guid><description>A remote stack-based buffer overflow vulnerability exists in the Tenda 4G300 router, version US_4G300V1.0Mt_V1.01.42_CN_TDC01, allowing an attacker to potentially execute arbitrary code by manipulating the 'page' argument to the sub_427C3C function in the /goform/SafeMacFilter file.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda 4G300 routers, specifically version US_4G300V1.0Mt_V1.01.42_CN_TDC01. The vulnerability resides within the <code>sub_427C3C</code> function located in the <code>/goform/SafeMacFilter</code> file. An attacker can exploit this flaw by manipulating the <code>page</code> argument in a crafted request, leading to a buffer overflow and potentially allowing for arbitrary code execution on the affected device. The vulnerability, identified as CVE-2026-7470, poses a significant risk as remote exploitation is possible, and a proof-of-concept exploit is publicly available, increasing the likelihood of malicious actors leveraging this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda 4G300 router running the vulnerable firmware version US_4G300V1.0Mt_V1.01.42_CN_TDC01.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeMacFilter</code> endpoint.</li>
<li>The crafted request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>sub_427C3C</code> function.</li>
<li>The router processes the HTTP request, passing the oversized <code>page</code> argument to the vulnerable function.</li>
<li>The <code>sub_427C3C</code> function attempts to write the oversized data into a stack-based buffer, causing a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory on the stack, including the return address.</li>
<li>The attacker redirects execution flow to a malicious code payload injected into the request or elsewhere in memory.</li>
<li>The injected code executes with the privileges of the router process, potentially allowing the attacker to gain full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda 4G300 router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a launching point for further attacks against other devices on the network or the internet. Given the widespread use of these routers in homes and small businesses, a successful attack could impact a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/goform/SafeMacFilter</code> with abnormally long <code>page</code> parameters. Use the provided Sigma rule to detect suspicious activity.</li>
<li>Implement rate limiting on the <code>/goform/SafeMacFilter</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7470.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>cve-2026-7470</category></item><item><title>Tenda W308R DNS Hijacking Vulnerability (CVE-2018-25316)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</guid><description>Tenda W308R v2 V5.07.48 is vulnerable to cookie session weakness, allowing unauthenticated attackers to modify DNS settings via crafted GET requests to redirect user traffic to malicious sites.</description><content:encoded><![CDATA[<p>Tenda W308R v2 running firmware V5.07.48 is susceptible to a cookie session weakness (CVE-2018-25316) that enables unauthenticated attackers to perform DNS hijacking. This vulnerability stems from insufficient session validation. An attacker can exploit this weakness by sending specially crafted GET requests to the <code>goform/AdvSetDns</code> endpoint. The malicious request includes a crafted admin language cookie, which bypasses authentication checks and allows modification of the device&rsquo;s DNS server settings. Successful exploitation allows the attacker to redirect the router&rsquo;s DNS queries to a malicious server under their control. This poses a significant risk to end-users, as it can lead to phishing attacks, malware distribution, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda W308R v2 router running firmware V5.07.48 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>goform/AdvSetDns</code> endpoint.</li>
<li>The GET request includes a crafted &ldquo;admin language cookie&rdquo; designed to bypass authentication.</li>
<li>The router receives the malicious GET request and, due to insufficient session validation, incorrectly authenticates the attacker.</li>
<li>The router processes the malicious request, modifying the DNS server settings to attacker-controlled DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker&rsquo;s DNS server redirects users to malicious websites, potentially serving malware or phishing pages.</li>
<li>Users unknowingly interact with the malicious content, leading to data theft, system compromise, or other harmful outcomes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to control DNS resolution for all devices connected to the affected Tenda W308R v2 router. This can lead to widespread redirection to phishing sites designed to steal credentials, or to sites hosting malware that infects user devices. Given the widespread use of Tenda routers, this vulnerability could impact a large number of home and small business networks. A successful attack allows the attacker to perform man-in-the-middle attacks, eavesdrop on network traffic, and compromise connected devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Hijack Attempt</code> to identify attempts to exploit this vulnerability by monitoring for suspicious requests to the <code>/goform/AdvSetDns</code> endpoint (log source: webserver).</li>
<li>Monitor web server logs for requests containing a crafted admin language cookie to the <code>/goform/AdvSetDns</code> endpoint, indicating potential exploitation attempts (log source: webserver).</li>
<li>Apply available patches or firmware updates from Tenda to address the cookie session weakness and prevent unauthorized DNS modifications.</li>
<li>Consider replacing the affected device if a patch is unavailable, especially in high-risk environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25316</category><category>dns-hijacking</category><category>tenda</category><category>cookie-injection</category></item><item><title>Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</guid><description>A stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda HG3 version 2.0. The vulnerability exists within the <code>formUploadConfig</code> function of the <code>/boaform/formIPv6Routing</code> file. A remote attacker can exploit this by manipulating the <code>destNet</code> argument, potentially leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-7151, has a publicly available exploit, increasing the risk of exploitation. This poses a significant threat to users of Tenda HG3 v2.0 routers, potentially allowing attackers to gain unauthorized access and control over the device. The CVSS v3.1 score is rated as 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda HG3 v2.0 router with default or known credentials, or no authentication at all.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/boaform/formIPv6Routing</code>.</li>
<li>The request targets the <code>formUploadConfig</code> function.</li>
<li>The <code>destNet</code> argument within the HTTP POST data is manipulated with a string exceeding the buffer size.</li>
<li>The <code>formUploadConfig</code> function processes the oversized <code>destNet</code> argument without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions on the stack.</li>
<li>The attacker gains arbitrary code execution on the device by overwriting the return address or other critical data on the stack.</li>
<li>The attacker can then leverage this to gain full control of the device, potentially modifying settings, injecting malware, or using it as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda HG3 v2.0 router. This could lead to complete compromise of the device, allowing the attacker to monitor network traffic, change router settings, or use the device as a launchpad for further attacks against other devices on the network. Given the potential for widespread exploitation due to the publicly available exploit, a large number of Tenda HG3 v2.0 users are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/boaform/formIPv6Routing</code> with excessively long <code>destNet</code> parameters to detect potential exploit attempts (see example Sigma rule below).</li>
<li>Implement rate limiting for requests to <code>/boaform/formIPv6Routing</code> to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches or firmware updates from Tenda to address CVE-2026-7151 on vulnerable HG3 2.0 devices.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting the <code>destNet</code> parameter in <code>/boaform/formIPv6Routing</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7151</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda HG3 2.0 Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</link><pubDate>Mon, 27 Apr 2026 22:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</guid><description>Tenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.</description><content:encoded><![CDATA[<p>Tenda HG3 2.0 is vulnerable to a command injection vulnerability (CVE-2026-7160) affecting the formTracert function in the /boaform/formTracert file. A remote attacker can exploit this by manipulating the datasize argument to inject arbitrary commands into the system. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. Public disclosure and potential exploitation make this a critical issue for users of the Tenda HG3 2.0 router. Successful exploitation allows an attacker to execute arbitrary commands on the device, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the /boaform/formTracert endpoint.</li>
<li>The malicious request includes a manipulated datasize argument designed to inject a command.</li>
<li>The web server processes the request and passes the manipulated datasize argument to the formTracert function.</li>
<li>The formTracert function fails to properly sanitize the input, allowing the injected command to be executed by the system.</li>
<li>The injected command executes with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary commands on the Tenda HG3 2.0 router. This can lead to complete compromise of the device, including modification of router settings, interception of network traffic, and potential use of the router as a botnet node. Given the high base score of 8.8, this poses a significant risk to affected users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-7160.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/boaform/formTracert</code> with unusual <code>datasize</code> parameters, as covered by the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo;.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block exploit attempts targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-7160</category><category>tenda</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability (CVE-2026-7101)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</link><pubDate>Mon, 27 Apr 2026 09:19:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 version 1.0.0.5 allows remote attackers to execute arbitrary code via a crafted request to the fromWrlclientSet function in the /goform/WrlclientSet file of the httpd component.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7101, has been discovered in Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromWrlclientSet</code> function within the <code>/goform/WrlclientSet</code> file, which is part of the router&rsquo;s httpd component. Successful exploitation allows remote attackers to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to home and small business networks using the affected Tenda router model, potentially leading to complete device compromise and unauthorized network access. The vulnerability was published on 2026-04-27 and is tracked by VulDB.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda F456 router running firmware version 1.0.0.5.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>The crafted request includes an oversized payload designed to overflow the buffer in the <code>fromWrlclientSet</code> function.</li>
<li>The <code>httpd</code> process attempts to process the request without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions, including critical program data and execution pointers.</li>
<li>The attacker gains control of the program execution flow.</li>
<li>The attacker executes arbitrary code on the router, potentially including shell commands or custom malware.</li>
<li>The attacker achieves complete control of the router, potentially enabling network reconnaissance, data exfiltration, or further attacks on the local network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda F456 router. This can lead to complete device compromise, allowing the attacker to control network traffic, modify router settings, or use the compromised device as a pivot point for further attacks within the network. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploitation could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched firmware version if available from the vendor.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/goform/WrlclientSet</code> endpoint using the provided Sigma rule.</li>
<li>Implement an IPS rule to detect and block exploit attempts targeting CVE-2026-7101.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7101</category><category>buffer-overflow</category><category>router</category><category>tenda</category><category>remote-code-execution</category></item><item><title>Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-path-traversal/</link><pubDate>Sun, 26 Apr 2026 12:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-path-traversal/</guid><description>CVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7036, exists in Tenda i9 version 1.0.0.5(2204). Specifically, the vulnerability resides in the R7WebsSecurityHandlerfunction of the HTTP Handler component. This flaw allows a remote, unauthenticated attacker to potentially access sensitive files and directories on the affected device. The vulnerability was reported on 2026-04-26, and a public exploit is reportedly available, increasing the risk of exploitation. This poses a significant threat to organizations using the affected Tenda i9 router, as it could lead to unauthorized access to sensitive information or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Tenda i9 router running firmware version 1.0.0.5(2204) accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable R7WebsSecurityHandlerfunction.</li>
<li>The crafted request includes a path traversal sequence (e.g., &ldquo;../&rdquo;) within the URL or request parameters.</li>
<li>The Tenda i9 router processes the malicious request without proper sanitization of the path.</li>
<li>The R7WebsSecurityHandlerfunction incorrectly interprets the path traversal sequence, allowing access to files or directories outside the intended web root.</li>
<li>The attacker gains unauthorized access to sensitive files, such as configuration files or system logs.</li>
<li>The attacker may use the exposed information to further compromise the device or the network it is connected to.</li>
<li>The attacker could potentially modify system files or execute commands, leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7036 can lead to unauthorized access to sensitive files on the Tenda i9 router. This includes configuration files containing credentials, system logs, or other confidential data. An attacker could leverage this access to gain further control of the device, potentially leading to a complete system compromise. While the number of affected devices is currently unknown, given the widespread use of Tenda routers, the potential impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect HTTP requests containing path traversal sequences targeting web servers to detect exploitation attempts (Sigma rule: &ldquo;Detect Tenda i9 Path Traversal Attempt&rdquo;).</li>
<li>Since the source mentions a public exploit exists, prioritize patching or replacing vulnerable Tenda i9 routers to remediate CVE-2026-7036 immediately, if a patch becomes available.</li>
<li>Monitor web server logs for unusual file access patterns or requests containing suspicious path traversal sequences.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7036</category><category>path-traversal</category><category>tenda</category><category>network</category></item><item><title>Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</link><pubDate>Sat, 25 Apr 2026 18:18:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</guid><description>A buffer overflow vulnerability in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon allows remote attackers to execute arbitrary code by manipulating the nextHop argument in the formRoute function of the /boaform/formRouting file, impacting device availability and integrity.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-6988, has been discovered in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. The vulnerability resides within the Boa Service, specifically affecting the <code>formRoute</code> function located in the <code>/boaform/formRouting</code> file. Successful exploitation of this flaw enables a remote attacker to overwrite memory by crafting a malicious request with a manipulated <code>nextHop</code> argument. This can lead to arbitrary code execution on the affected device. Given the potential for remote exploitation and the availability of a published exploit, this vulnerability poses a significant threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device with the vulnerable Boa web service exposed.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/boaform/formRouting</code> endpoint.</li>
<li>The crafted request includes a specially crafted <code>nextHop</code> argument, exceeding the buffer size allocated for it.</li>
<li>The Boa service processes the request without proper bounds checking on the <code>nextHop</code> argument.</li>
<li>The oversized <code>nextHop</code> argument overwrites adjacent memory regions, including critical program data or return addresses.</li>
<li>The overwritten return address redirects execution flow to attacker-controlled code.</li>
<li>The attacker executes arbitrary code on the device with the privileges of the Boa service.</li>
<li>The attacker gains control of the device, potentially leading to data exfiltration, device hijacking, or further network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6988 can lead to complete compromise of the affected Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device. This may result in unauthorized access to the device&rsquo;s configuration, sensitive data exposure, or the device being used as a bot in a larger attack. Given that this device is likely used in home or small business environments, a successful attack could lead to significant data breaches, financial losses, and reputational damage. The availability of a public exploit increases the likelihood of widespread exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates released by Tenda to address CVE-2026-6988 as soon as possible.</li>
<li>Implement network segmentation to limit the exposure of Tenda devices to the internet or untrusted networks.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/boaform/formRouting</code> endpoint to detect potential exploit attempts (webserver log source).</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG10 Buffer Overflow Attempt&rdquo; to identify malicious HTTP requests exploiting the <code>nextHop</code> argument (Sigma rule).</li>
<li>Implement rate limiting on the <code>/boaform/formRouting</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>cve-2026-6988</category><category>tenda</category><category>iot</category></item><item><title>Tenda F451 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-buffer-overflow/</link><pubDate>Mon, 20 Apr 2026 11:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6631) in Tenda F451 router version 1.0.0.7_cn_svn7958 allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/webExcptypemanFilter component.</description><content:encoded><![CDATA[<p>CVE-2026-6631 is a critical buffer overflow vulnerability affecting Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. The vulnerability resides in the <code>fromwebExcptypemanFilter</code> function within the <code>/goform/webExcptypemanFilter</code> component of the router&rsquo;s <code>httpd</code> web server. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request with an overly long &lsquo;page&rsquo; parameter. Publicly available exploits exist, increasing the risk of widespread exploitation. Successful exploitation allows attackers to execute arbitrary code on the router, potentially leading to full device compromise and network access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F451 router exposed to the internet.</li>
<li>Attacker crafts a malicious HTTP GET or POST request targeting <code>/goform/webExcptypemanFilter</code>.</li>
<li>The crafted request includes the <code>page</code> parameter with a payload exceeding the buffer size allocated for it.</li>
<li>The <code>httpd</code> server processes the request and passes the <code>page</code> parameter to the vulnerable <code>fromwebExcptypemanFilter</code> function.</li>
<li>Due to the lack of proper bounds checking, the overly long <code>page</code> parameter overwrites adjacent memory regions on the stack.</li>
<li>The attacker carefully designs the overflow payload to overwrite the return address on the stack with the address of malicious code injected elsewhere in memory.</li>
<li>The <code>fromwebExcptypemanFilter</code> function completes execution and attempts to return, jumping to the attacker-controlled address.</li>
<li>The attacker&rsquo;s malicious code executes with the privileges of the <code>httpd</code> server, potentially gaining full control of the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6631 allows remote attackers to execute arbitrary code on vulnerable Tenda F451 routers. This can lead to complete device compromise, allowing attackers to modify router settings, intercept network traffic, or use the router as a point of entry for further attacks on the internal network. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, potentially impacting both home and small business networks. The availability of public exploits further increases the likelihood of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from Tenda to patch CVE-2026-6631.</li>
<li>Monitor web server logs for suspicious requests to <code>/goform/webExcptypemanFilter</code> with unusually long <code>page</code> parameters, using the Sigma rule <code>DetectTendaF451BufferOverflow</code>.</li>
<li>Implement network intrusion detection systems (IDS) to detect and block exploit attempts targeting CVE-2026-6631.</li>
<li>Consider deploying the Sigma rule <code>DetectTendaF451SuspiciousProcess</code> to identify unexpected processes spawned by the httpd daemon.</li>
<li>If patching is not immediately feasible, consider restricting access to the router&rsquo;s web interface from the public internet to mitigate the risk of remote exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer_overflow</category><category>cve-2026-6631</category><category>webserver</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</link><pubDate>Sun, 12 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</guid><description>A remote stack-based buffer overflow vulnerability exists in the fromDhcpListClient function of the /goform/DhcpListClient component (httpd) within Tenda F451 firmware version 1.0.0.7, triggered by manipulating the 'page' argument, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda F451 router firmware version 1.0.0.7. The vulnerability resides in the <code>fromDhcpListClient</code> function within the <code>/goform/DhcpListClient</code> component&rsquo;s httpd service. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious <code>page</code> argument. This can lead to arbitrary code execution on the device. Given the public availability of the exploit (CVE-2026-6120), Tenda F451 routers are at immediate risk of compromise if not properly secured. This vulnerability poses a significant threat due to the widespread use of Tenda routers in home and small office environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router running vulnerable firmware version 1.0.0.7.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/DhcpListClient</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a string exceeding the buffer size allocated for it in the <code>fromDhcpListClient</code> function.</li>
<li>The <code>httpd</code> service on the router receives the malicious request and passes the <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromDhcpListClient</code> function attempts to copy the oversized <code>page</code> argument into a fixed-size buffer on the stack, causing a buffer overflow.</li>
<li>The overflow overwrites adjacent stack memory, including the return address of the function.</li>
<li>The attacker controls the overwritten return address, redirecting execution to attacker-controlled code or a ROP chain.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete device compromise and network access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda F451 router. This allows attackers to control the device, intercept network traffic, change DNS settings, inject malicious scripts into web pages served to connected devices, or use the router as a pivot point for further attacks within the network. This vulnerability affects all users of the Tenda F451 router running firmware version 1.0.0.7, potentially impacting thousands of devices globally. Given the high CVSS score of 8.8, the risk is substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the <code>/goform/DhcpListClient</code> endpoint, especially those with unusually long <code>page</code> parameters (refer to the rule <code>Tenda F451 Suspicious URI Length</code>).</li>
<li>Inspect network traffic for abnormal patterns related to compromised routers (unusual DNS requests, connections to known malicious IPs).</li>
<li>Implement rate limiting and input validation on web server endpoints where possible to mitigate buffer overflow attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-6120, although patches may not be available.</li>
<li>Consider deploying network intrusion detection systems (NIDS) to identify and block exploitation attempts (refer to the <code>Tenda F451 Buffer Overflow Attempt</code> rule).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-6120</category><category>iot</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-overflow/</link><pubDate>Sun, 12 Apr 2026 08:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-overflow/</guid><description>Tenda F451 router version 1.0.0.7 is vulnerable to a stack-based buffer overflow in the frmL7ProtForm function, enabling remote attackers to execute arbitrary code by manipulating the 'page' argument.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda F451 router version 1.0.0.7. The vulnerability resides within the <code>frmL7ProtForm</code> function of the <code>/goform/L7Prot</code> component, specifically within the <code>httpd</code> service. A remote attacker can exploit this flaw by crafting a malicious request targeting the <code>page</code> argument. Successful exploitation allows the attacker to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to affected devices, potentially leading to full device compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F451 router running firmware version 1.0.0.7.</li>
<li>Attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/L7Prot</code> endpoint.</li>
<li>The malicious request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>frmL7ProtForm</code> function.</li>
<li>The <code>httpd</code> service processes the request without proper bounds checking on the <code>page</code> argument.</li>
<li>The oversized payload overflows the stack buffer during the execution of the <code>frmL7ProtForm</code> function.</li>
<li>The buffer overflow overwrites adjacent memory regions on the stack, including the return address.</li>
<li>The attacker-controlled return address redirects execution to attacker-supplied code or a return-oriented programming (ROP) chain.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F451 router. This can lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the device as a bot in a botnet. Given the availability of public exploits, vulnerable devices are at high risk of compromise. The number of potentially affected devices is substantial, as the Tenda F451 is a widely used router model.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/L7Prot</code> with unusually long <code>page</code> parameters, deploying the Sigma rule <code>Detect Tenda F451 Buffer Overflow Attempt</code> to identify potential exploitation attempts.</li>
<li>Since no patch is available, consider replacing the Tenda F451 1.0.0.7 with a more secure router or firewall solution.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other network devices.</li>
<li>Disable remote administration access to the router to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6122</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item><item><title>Tenda F451 Stack-Based Buffer Overflow Vulnerability (CVE-2026-6121)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-overflow/</link><pubDate>Sun, 12 Apr 2026 08:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6121) exists in the WrlclientSet function of the /goform/WrlclientSet file in the httpd component of Tenda F451 version 1.0.0.7, allowing remote attackers to execute arbitrary code by manipulating the GO argument.</description><content:encoded><![CDATA[<p>CVE-2026-6121 is a stack-based buffer overflow vulnerability affecting Tenda F451 router version 1.0.0.7. The vulnerability resides within the <code>WrlclientSet</code> function located in the <code>/goform/WrlclientSet</code> file of the <code>httpd</code> component. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the affected router, specifically manipulating the <code>GO</code> argument. Due to insufficient bounds checking on the <code>GO</code> argument&rsquo;s size when passed to the <code>WrlclientSet</code> function, an attacker can write beyond the allocated buffer on the stack, potentially leading to arbitrary code execution. Publicly available exploits exist, increasing the risk of widespread exploitation. Routers that are accessible from the internet are at highest risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router version 1.0.0.7 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>Within the HTTP POST request, the attacker includes the <code>GO</code> argument, filling it with a payload exceeding the buffer size allocated for it within the <code>WrlclientSet</code> function.</li>
<li>The <code>httpd</code> component of the Tenda F451 router receives the HTTP request and passes the <code>GO</code> argument to the vulnerable <code>WrlclientSet</code> function.</li>
<li>Due to the buffer overflow, the attacker&rsquo;s payload overwrites adjacent memory locations on the stack.</li>
<li>The attacker&rsquo;s payload overwrites the return address on the stack, redirecting execution flow to attacker-controlled code.</li>
<li>The attacker-controlled code executes with the privileges of the <code>httpd</code> process, allowing the attacker to perform actions such as modifying router configuration, executing system commands, or establishing a reverse shell.</li>
<li>The attacker gains persistent access to the router and potentially the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6121 can lead to complete compromise of the affected Tenda F451 router. An attacker can gain unauthorized access to the device&rsquo;s configuration, potentially modifying DNS settings, firewall rules, or other critical parameters. This can lead to redirection of user traffic, denial-of-service attacks, or the establishment of a foothold within the targeted network for further malicious activities. Given the ease of exploitation due to the publicly available exploit code, a large number of Tenda F451 routers could be compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/WrlclientSet</code> with abnormally long <code>GO</code> parameter values to detect potential exploitation attempts (see Sigma rule below and enable webserver logging).</li>
<li>Implement rate limiting for requests to the <code>/goform/WrlclientSet</code> endpoint to mitigate potential brute-force exploitation attempts (configure your firewall or WAF).</li>
<li>Upgrade to a patched firmware version when available or replace the affected devices, if the vendor does not provide a fix.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6121</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-rce/</link><pubDate>Fri, 10 Apr 2026 00:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-rce/</guid><description>A stack-based buffer overflow vulnerability in the Tenda F451 router (version 1.0.0.7) allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the fromRouteStatic function of the /goform/RouteStatic file.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5989, affects the Tenda F451 router, specifically version 1.0.0.7. The vulnerability lies within the <code>fromRouteStatic</code> function of the <code>/goform/RouteStatic</code> file. By manipulating the <code>page</code> argument, a remote attacker can trigger a stack-based buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat as it allows unauthenticated remote attackers to compromise the router, potentially leading to network disruption, data theft, or use of the device in botnet activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda F451 router (version 1.0.0.7) exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/RouteStatic</code> endpoint.</li>
<li>The request includes a <code>page</code> argument with a payload designed to overflow the stack buffer in the <code>fromRouteStatic</code> function.</li>
<li>The vulnerable <code>fromRouteStatic</code> function processes the malicious <code>page</code> argument without proper bounds checking.</li>
<li>The buffer overflow overwrites critical data on the stack, including the return address.</li>
<li>Upon function return, control is redirected to the attacker-controlled memory region.</li>
<li>The attacker executes arbitrary code injected into the overflowed buffer, such as downloading and executing a reverse shell.</li>
<li>The attacker gains remote access to the router, potentially allowing further exploitation or network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5989 allows an attacker to gain complete control of the Tenda F451 router. This can lead to a variety of damaging outcomes, including denial-of-service attacks against the local network, interception of network traffic, modification of router settings, and the potential use of the compromised router as a node in a botnet. Given the widespread use of Tenda routers in home and small business environments, a large number of devices could be at risk if this vulnerability is actively exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/RouteStatic</code> containing abnormally long <code>page</code> arguments, as this is indicative of potential exploit attempts. Deploy the Sigma rule <code>Detect Tenda F451 Exploit Attempt</code> to detect these malicious requests.</li>
<li>Implement rate limiting on requests to the <code>/goform/RouteStatic</code> endpoint to mitigate potential denial-of-service attacks.</li>
<li>Since there is no patch available, consider replacing vulnerable Tenda F451 routers with more secure devices from other vendors.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>tenda</category><category>router</category><category>buffer_overflow</category><category>rce</category></item><item><title>Tenda AC15 Router Stack-Based Buffer Overflow (CVE-2026-5830)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ac15-overflow/</link><pubDate>Thu, 09 Apr 2026 02:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ac15-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5830) in Tenda AC15 firmware version 15.03.05.18 allows remote attackers to execute arbitrary code by manipulating password change parameters, potentially leading to complete device compromise.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, tracked as CVE-2026-5830, has been identified in Tenda AC15 routers running firmware version 15.03.05.18. The vulnerability resides in the <code>websGetVar</code> function within the <code>/goform/SysToolChangePwd</code> file, which handles password change requests. By crafting malicious requests and manipulating the <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> arguments, an attacker can overwrite the stack, potentially leading to arbitrary code execution. The vulnerability is remotely exploitable by an authenticated user, and publicly available exploit code exists, increasing the risk of widespread exploitation. This poses a significant threat to home and small business networks using affected Tenda AC15 routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to the router&rsquo;s web management interface, potentially through weak credentials or brute-forcing.</li>
<li>The attacker crafts a malicious HTTP POST request to <code>/goform/SysToolChangePwd</code>.</li>
<li>The crafted request includes oversized data within the <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> parameters.</li>
<li>The <code>websGetVar</code> function processes the request without proper bounds checking.</li>
<li>The oversized data overflows the stack buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address on the stack.</li>
<li>The <code>websGetVar</code> function returns, diverting execution to the attacker-controlled address.</li>
<li>The attacker-controlled address contains shellcode that executes arbitrary commands, potentially granting complete control over the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda AC15 router. This could lead to complete device compromise, including unauthorized access to network traffic, modification of router settings, installation of malware, and use of the compromised device as a botnet node. Given the potentially widespread use of Tenda AC15 routers in home and small business environments, a large number of devices could be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from Tenda to remediate CVE-2026-5830 as soon as they become available.</li>
<li>Monitor webserver logs for suspicious POST requests to <code>/goform/SysToolChangePwd</code> with unusually long <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> parameters and deploy the Sigma rule <code>Detect Tenda AC15 Password Change Overflow</code>.</li>
<li>Implement strong password policies and multi-factor authentication to prevent unauthorized access to the router&rsquo;s web management interface.</li>
<li>Restrict access to the router&rsquo;s web management interface to trusted networks only by configuring firewall rules.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5830</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>stack-overflow</category></item><item><title>Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5686)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-stack-overflow/</link><pubDate>Mon, 06 Apr 2026 22:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-stack-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5686) exists in the Tenda CX12L router version 16.03.53.12, allowing remote attackers to potentially execute arbitrary code by manipulating the 'page' argument in the `/goform/RouteStatic` endpoint.</description><content:encoded><![CDATA[<p>CVE-2026-5686 is a critical vulnerability affecting Tenda CX12L routers running firmware version 16.03.53.12. This stack-based buffer overflow is located in the <code>fromRouteStatic</code> function within the <code>/goform/RouteStatic</code> file. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request with a malicious <code>page</code> argument. Publicly available exploit code exists, increasing the risk of widespread exploitation. Successful exploitation could lead to arbitrary code execution, potentially allowing attackers to gain full control of the affected router. This poses a significant risk to home and small business networks using the vulnerable device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda CX12L router running firmware version 16.03.53.12.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/goform/RouteStatic</code>.</li>
<li>The request includes a <code>page</code> argument with a string exceeding the buffer size allocated to the <code>fromRouteStatic</code> function.</li>
<li>The oversized <code>page</code> argument overwrites adjacent memory on the stack, including the return address.</li>
<li>When the <code>fromRouteStatic</code> function returns, it attempts to jump to the overwritten return address controlled by the attacker.</li>
<li>The attacker&rsquo;s payload, injected via the overflowed buffer, is executed with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains remote code execution on the router.</li>
<li>The attacker can then use the compromised router as a foothold for further attacks, such as network reconnaissance, lateral movement, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5686 allows a remote attacker to execute arbitrary code on the affected Tenda CX12L router. This could lead to a complete compromise of the device, enabling attackers to modify router settings, intercept network traffic, or use the router as a proxy for malicious activities. Given the widespread use of Tenda routers in home and small business networks, this vulnerability could have a significant impact, potentially affecting thousands of users. A successful attack could lead to data breaches, service disruptions, and further compromise of connected devices within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-5686.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/RouteStatic</code> with unusually long <code>page</code> parameters, using the provided Sigma rule.</li>
<li>Implement network intrusion detection systems (IDS) to detect and block exploit attempts targeting this vulnerability.</li>
<li>Restrict access to the router&rsquo;s administrative interface to trusted networks or IP addresses to limit the attack surface.</li>
<li>Regularly review router configurations and security settings to ensure they align with best practices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5686</category><category>tenda</category><category>router</category><category>stack-based buffer overflow</category><category>remote code execution</category></item><item><title>Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 22:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in the Tenda CX12L router (version 16.03.53.12) due to improper handling of the 'page' argument in the 'fromwebExcptypemanFilter' function, potentially allowing attackers with local network access to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda CX12L routers running firmware version 16.03.53.12. The vulnerability resides within the <code>fromwebExcptypemanFilter</code> function in the <code>/goform/webExcptypemanFilter</code> file.  An attacker with local network access can exploit this flaw by manipulating the <code>page</code> argument passed to this function, leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-5684, has a CVSS v3.1 score of 8.0, indicating a high severity. Public exploits for this vulnerability are available, making it crucial for network administrators to address this issue promptly. Successful exploitation could allow an attacker to gain complete control of the router, potentially leading to data theft, network compromise, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the local network where the Tenda CX12L router is located.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/webExcptypemanFilter</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>fromwebExcptypemanFilter</code> function.</li>
<li>The router processes the HTTP request and passes the overly long <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromwebExcptypemanFilter</code> function attempts to write the contents of the <code>page</code> argument into a fixed-size buffer on the stack.</li>
<li>Due to the excessive length of the <code>page</code> argument, the buffer overflows, overwriting adjacent memory regions on the stack.</li>
<li>The attacker leverages the buffer overflow to overwrite the return address on the stack with the address of malicious code or a ROP chain.</li>
<li>When the <code>fromwebExcptypemanFilter</code> function returns, control is transferred to the attacker-controlled code, allowing for arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5684 allows an attacker with local network access to gain complete control of the affected Tenda CX12L router. This can lead to a variety of malicious activities, including unauthorized access to network traffic, modification of router settings, deployment of malicious firmware, and use of the compromised router as a botnet node. Given the availability of public exploits, organizations using this router model are at significant risk. The number of potential victims is dependent on the number of unpatched Tenda CX12L devices deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor webserver logs for HTTP requests targeting the <code>/goform/webExcptypemanFilter</code> endpoint with abnormally long <code>page</code> parameters to detect potential exploitation attempts. (Log Source: webserver, Rule: &ldquo;Detect Tenda CX12L Web Request with Long Page Parameter&rdquo;)</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda CX12L Stack Buffer Overflow Attempt&rdquo; to identify suspicious process creations following a potential exploit.</li>
<li>Review and restrict local network access to the Tenda CX12L router to reduce the attack surface, as the exploit requires local network access.</li>
<li>Contact Tenda for a security patch or firmware update to address CVE-2026-5684.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-5684</category></item><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda CH22 version 1.0.0.1 allows a remote attacker to execute arbitrary code by manipulating the 'GO' argument in the formWrlExtraSet function via the /goform/WrlExtraSet endpoint.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5605, affects Tenda CH22 router version 1.0.0.1. This flaw resides in the <code>formWrlExtraSet</code> function within the <code>/goform/WrlExtraSet</code> file. A remote, unauthenticated attacker can exploit a stack-based buffer overflow by sending a crafted HTTP request with a malicious value for the <code>GO</code> argument. Publicly available exploits exist, increasing the risk of widespread exploitation. Successful exploitation allows the attacker to potentially execute arbitrary code on the device, leading to a complete compromise of the router and the network it serves.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlExtraSet</code> endpoint.</li>
<li>The crafted request includes the <code>GO</code> argument with a string exceeding the expected buffer size in the <code>formWrlExtraSet</code> function.</li>
<li>The router&rsquo;s web server receives the request and passes the <code>GO</code> argument to the vulnerable function.</li>
<li>The <code>formWrlExtraSet</code> function attempts to copy the oversized <code>GO</code> argument into a fixed-size buffer on the stack.</li>
<li>This write operation overflows the buffer, overwriting adjacent memory regions, including the return address.</li>
<li>When the <code>formWrlExtraSet</code> function returns, it jumps to the address overwritten by the attacker.</li>
<li>The attacker&rsquo;s injected code executes with the privileges of the web server process, potentially allowing full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5605 can lead to complete compromise of the Tenda CH22 router. This includes unauthorized access to network traffic, modification of router settings, and the potential for the router to be used as a pivot point for further attacks within the network. Given the ease of exploitation and the public availability of exploits, a large number of devices are potentially at risk, impacting both home and small business users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/WrlExtraSet</code> with unusually long <code>GO</code> parameter values to detect potential exploitation attempts. Use the Sigma rule provided below.</li>
<li>Implement rate limiting on requests to <code>/goform/WrlExtraSet</code> to mitigate brute-force exploitation attempts.</li>
<li>Since there is no patch available, consider replacing affected Tenda CH22 1.0.0.1 routers with devices from vendors with timely security updates.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5605</category><category>buffer-overflow</category><category>tenda</category></item><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-overflow/</link><pubDate>Sun, 05 Apr 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5604) in Tenda CH22 1.0.0.1 allows remote attackers to execute arbitrary code by manipulating the 'standard' argument in the formCertLocalPrecreate function of the /goform/CertLocalPrecreate file within the Parameter Handler component.</description><content:encoded><![CDATA[<p>CVE-2026-5604 details a critical security vulnerability affecting Tenda CH22 router version 1.0.0.1. The vulnerability is a stack-based buffer overflow located in the <code>formCertLocalPrecreate</code> function within the <code>/goform/CertLocalPrecreate</code> file, which handles parameters. Attackers can exploit this flaw by manipulating the <code>standard</code> argument. The vulnerability can be triggered remotely, meaning an attacker does not need local access to the device. Given that a public exploit is available, this vulnerability poses a significant risk to users of the affected Tenda CH22 router. This allows unauthenticated attackers to potentially gain full control of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Tenda CH22 router version 1.0.0.1 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/CertLocalPrecreate</code> endpoint.</li>
<li>The attacker includes an overly long string as the value for the <code>standard</code> parameter in the HTTP request.</li>
<li>The Tenda CH22 router receives the malicious request and passes the <code>standard</code> parameter to the <code>formCertLocalPrecreate</code> function.</li>
<li>The <code>formCertLocalPrecreate</code> function copies the oversized <code>standard</code> argument into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions, including the return address of the function.</li>
<li>The attacker controls the overwritten return address to point to attacker-controlled code injected into memory, or to a Return-Oriented Programming (ROP) chain.</li>
<li>Upon function return, execution is redirected to the attacker&rsquo;s code, allowing them to execute arbitrary commands on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5604 allows a remote, unauthenticated attacker to execute arbitrary code on the Tenda CH22 router. This could lead to a complete compromise of the device, allowing the attacker to gain control over network traffic, modify router settings, or use the device as part of a botnet. Given the wide deployment of Tenda routers, a large number of devices could be vulnerable, making this a high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/CertLocalPrecreate</code> with unusually long <code>standard</code> parameters to identify potential exploit attempts (see rule: &ldquo;Detect Tenda CH22 Buffer Overflow Attempt via Long Standard Parameter&rdquo;).</li>
<li>Implement rate limiting on the <code>/goform/CertLocalPrecreate</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-5604.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda CH22 Router POST Request to CertLocalPrecreate&rdquo; to identify suspicious POST requests to the affected endpoint and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5604</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda M3 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-m3-overflow/</link><pubDate>Sun, 05 Apr 2026 13:17:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-m3-overflow/</guid><description>A buffer overflow vulnerability exists in Tenda M3 1.0.0.10 via manipulation of the policyType argument in the setAdvPolicyData function, allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability has been identified in Tenda M3 router version 1.0.0.10. The vulnerability resides in the <code>setAdvPolicyData</code> function within the <code>/goform/setAdvPolicyData</code> file, a part of the Destination Handler component. By manipulating the <code>policyType</code> argument, a remote attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations utilizing the affected Tenda M3 router, potentially allowing attackers to gain unauthorized access to the network or disrupt services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda M3 router exposed to the internet or reachable from their network position.</li>
<li>Attacker sends a crafted HTTP POST request to <code>/goform/setAdvPolicyData</code>.</li>
<li>The POST request includes a malicious <code>policyType</code> argument designed to overflow the buffer in the <code>setAdvPolicyData</code> function.</li>
<li>The <code>setAdvPolicyData</code> function in <code>/goform/setAdvPolicyData</code> processes the <code>policyType</code> argument without proper bounds checking.</li>
<li>The excessive data provided in the <code>policyType</code> argument overwrites adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite critical data or inject malicious code into the process&rsquo;s memory space.</li>
<li>The injected code is executed, giving the attacker control over the router.</li>
<li>The attacker can then use the compromised router as a foothold to pivot to other devices on the network, exfiltrate sensitive data, or cause denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda M3 router. This could lead to a complete compromise of the device, allowing the attacker to control network traffic, access sensitive information, or use the router as a launchpad for further attacks within the network. Given the severity and the existence of public exploits, vulnerable routers are at high risk of being targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-5567.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/setAdvPolicyData</code> with unusually long <code>policyType</code> arguments; deploy the Sigma rule <code>Detect Suspicious PolicyType Argument Length</code> to identify this activity.</li>
<li>Implement network segmentation to limit the potential impact of a compromised router.</li>
<li>Consider using a web application firewall (WAF) to filter malicious requests targeting the affected endpoint.</li>
<li>Review and restrict access to the router&rsquo;s management interface to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5567</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>webserver</category></item><item><title>Tenda AC10 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ac10-overflow/</link><pubDate>Sun, 05 Apr 2026 08:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ac10-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5550) in Tenda AC10 firmware version 16.03.10.10_multi_TDE01 within the /bin/httpd SysToolChangePwd function allows remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-5550, exists in Tenda AC10 router firmware version 16.03.10.10_multi_TDE01. The vulnerability is located in the <code>fromSysToolChangePwd</code> function within the <code>/bin/httpd</code> binary. A remote attacker can exploit this flaw to overwrite the stack and potentially execute arbitrary code on the affected device. This is achieved by sending a specially crafted request to the device. Successful exploitation could lead to complete system compromise, allowing attackers to gain unauthorized access, control the device, or use it as a foothold for further network intrusion. Given the widespread use of Tenda routers, this vulnerability poses a significant risk to home and small business networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda AC10 router running firmware version 16.03.10.10_multi_TDE01.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/bin/httpd</code> endpoint.</li>
<li>The malicious request is designed to overflow the buffer in the <code>fromSysToolChangePwd</code> function when processing the request parameters.</li>
<li>The overflow overwrites the stack with attacker-controlled data, including the return address.</li>
<li>The <code>httpd</code> process attempts to return from the <code>fromSysToolChangePwd</code> function.</li>
<li>Due to the overwritten return address, execution is redirected to the attacker&rsquo;s code.</li>
<li>The attacker&rsquo;s code executes with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains control of the device and can perform arbitrary actions, such as modifying router settings, executing commands, or establishing a backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5550 allows a remote attacker to gain complete control of the affected Tenda AC10 router. This can lead to data breaches, denial-of-service attacks, or the router being used as part of a botnet. Given the potential for widespread exploitation and the ease with which the vulnerability can be triggered, CVE-2026-5550 poses a high risk to users of the affected Tenda AC10 router model. The attacker could potentially monitor all network traffic passing through the device, steal sensitive information, or use the compromised device to launch attacks against other systems on the network or the internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/bin/httpd</code> with abnormally large parameter values that could indicate a buffer overflow attempt targeting the <code>fromSysToolChangePwd</code> function to trigger the vulnerability (see the related Sigma rule below).</li>
<li>Since a patch is not mentioned, consider replacing the affected Tenda AC10 device or isolating it from critical network segments if immediate replacement is not feasible.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5550</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda 4G03 Pro Improper Access Control Vulnerability (CVE-2026-5526)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-4g03-pro-access-control/</link><pubDate>Sat, 04 Apr 2026 23:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-4g03-pro-access-control/</guid><description>CVE-2026-5526 describes an improper access control vulnerability in the Tenda 4G03 Pro router's /bin/httpd file, allowing remote attackers to potentially gain unauthorized access.</description><content:encoded><![CDATA[<p>A security vulnerability, identified as CVE-2026-5526, affects the Tenda 4G03 Pro router, specifically versions up to 1.0/1.1/04.03.01.53/192.168.0.1. The flaw resides within an unspecified function of the <code>/bin/httpd</code> file, leading to improper access controls. A remote attacker could exploit this vulnerability, potentially gaining unauthorized access to the device. Publicly available exploits exist, increasing the risk of exploitation. This issue was reported on April 4, 2026, and poses a significant threat due to the ease of remote exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda 4G03 Pro router with a publicly accessible web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/bin/httpd</code> file.</li>
<li>The malicious request exploits the improper access control vulnerability (CVE-2026-5526).</li>
<li>The router&rsquo;s <code>/bin/httpd</code> process improperly handles the request, bypassing access controls.</li>
<li>The attacker gains unauthorized access to sensitive functionalities of the router.</li>
<li>The attacker modifies router configurations, such as DNS settings or firewall rules.</li>
<li>The attacker could potentially use the compromised router as a pivot point for further network attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5526 could allow attackers to remotely compromise Tenda 4G03 Pro routers. This can lead to unauthorized access to the device&rsquo;s configuration, modification of settings, or use of the router as a stepping stone for further attacks within the network. Given the availability of public exploits, unpatched devices are at significant risk. While the exact number of affected devices is unknown, the widespread use of Tenda routers makes this a potentially significant issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting <code>/bin/httpd</code> using the provided Sigma rule.</li>
<li>Apply available firmware updates or patches from Tenda to address CVE-2026-5526 as soon as they are released.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Enforce strong password policies for router administration to prevent unauthorized access.</li>
<li>Review and update firewall rules to restrict access to the router&rsquo;s web interface from untrusted networks.</li>
<li>Deploy the provided Sigma rule to detect suspicious process execution originating from the web server process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5526</category><category>tenda</category><category>router</category><category>access-control</category></item><item><title>Tenda CH22 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5204)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-bo/</link><pubDate>Tue, 31 Mar 2026 16:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5204) exists in the Tenda CH22 1.0.0.1 router, allowing remote attackers to execute arbitrary code by manipulating the webSiteId argument in the formWebTypeLibrary function.</description><content:encoded><![CDATA[<p>CVE-2026-5204 describes a critical stack-based buffer overflow vulnerability affecting Tenda CH22 router version 1.0.0.1. The vulnerability resides within the <code>formWebTypeLibrary</code> function in the <code>/goform/webtypelibrary</code> file, which handles web-based parameter input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the router, manipulating the <code>webSiteId</code> argument to overwrite the stack buffer. This allows for arbitrary code execution on the device. Given the router&rsquo;s role as a network gateway, successful exploitation can lead to complete compromise of the device and potentially the entire network behind it. The availability of a public exploit increases the risk of widespread exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/webtypelibrary</code> endpoint.</li>
<li>The crafted request includes the <code>webSiteId</code> parameter with a payload exceeding the expected buffer size, triggering the stack-based buffer overflow in the <code>formWebTypeLibrary</code> function.</li>
<li>The overflow overwrites critical data on the stack, including the return address.</li>
<li>The overwritten return address is replaced with the address of malicious code injected into the payload or a pre-existing code location within the router&rsquo;s firmware (Return-Oriented Programming - ROP).</li>
<li>The <code>formWebTypeLibrary</code> function returns, transferring control to the attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes, granting the attacker control over the device.</li>
<li>The attacker can then use this control to further compromise the network or disrupt services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5204 allows a remote attacker to execute arbitrary code on the vulnerable Tenda CH22 router. This can lead to complete control of the device, enabling the attacker to intercept network traffic, modify DNS settings, create VPNs, or launch further attacks on devices within the network. Given that routers are essential network devices, a successful attack can have a significant impact, affecting all connected devices and potentially exposing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates for Tenda CH22 routers immediately to patch CVE-2026-5204.</li>
<li>Deploy the Sigma rule <code>Tenda-CH22-WebSiteId-Buffer-Overflow</code> to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/webtypelibrary</code> with unusually long <code>webSiteId</code> parameters, as indicated by <code>WebSiteId_Length_Detection</code> Sigma rule.</li>
<li>Implement network segmentation to limit the impact of a potential router compromise.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5204</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-overflow/</link><pubDate>Tue, 31 Mar 2026 00:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1 via manipulation of the `mit_linktype` argument in the `/goform/QuickIndex` endpoint, potentially enabling remote code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda CH22 router version 1.0.0.1. The vulnerability resides within the <code>formQuickIndex</code> function of the <code>/goform/QuickIndex</code> file, which is a component of the Parameter Handler. This flaw can be triggered by manipulating the <code>mit_linktype</code> argument, leading to a buffer overflow on the stack. The vulnerability is remotely exploitable, meaning an attacker can trigger the flaw over the network without needing local access to the device. The existence of a public exploit further increases the risk of potential exploitation by malicious actors. Successful exploitation could allow an attacker to execute arbitrary code on the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/QuickIndex</code> endpoint.</li>
<li>The malicious request includes the <code>mit_linktype</code> argument with a payload exceeding the expected buffer size.</li>
<li>The Tenda CH22 router processes the HTTP request and passes the <code>mit_linktype</code> argument to the <code>formQuickIndex</code> function.</li>
<li>The <code>formQuickIndex</code> function copies the attacker-controlled <code>mit_linktype</code> data into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>Due to the oversized payload, the copy operation overflows the buffer, overwriting adjacent memory on the stack, including the return address.</li>
<li>The <code>formQuickIndex</code> function completes and attempts to return to the caller function.</li>
<li>Due to the overwritten return address, control is redirected to attacker-controlled code, enabling arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the Tenda CH22 router. This can lead to a variety of malicious outcomes, including complete device compromise, denial of service, and the potential to use the router as a launchpad for further attacks on the local network or the internet. Given that routers are often used in both home and small business environments, a successful attack could affect a wide range of users and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/QuickIndex</code> with unusually long <code>mit_linktype</code> parameters to detect potential exploitation attempts. Implement the Sigma rule <code>Detect Tenda CH22 mit_linktype Buffer Overflow Attempt</code> against web server logs.</li>
<li>Implement rate limiting on the <code>/goform/QuickIndex</code> endpoint to mitigate potential denial-of-service attacks stemming from exploitation.</li>
<li>Since the source material identifies CWE-119 and CWE-121 as root causes, review code practices related to buffer handling and implement stricter input validation procedures.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5156</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda CH22 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-buffer-overflow/</link><pubDate>Mon, 30 Mar 2026 23:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1/1.If allowing remote attackers to execute arbitrary code by manipulating the `funcname` argument in the `/goform/setcfm` endpoint.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-5154, has been discovered in Tenda CH22 firmware version 1.0.0.1/1.If. The vulnerability resides within the <code>fromSetCfm</code> function in the <code>/goform/setcfm</code> file, a component of the Parameter Handler. Successful exploitation allows remote attackers to execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to affected Tenda CH22 devices, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda CH22 device running firmware version 1.0.0.1/1.If.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setcfm</code> endpoint.</li>
<li>The request includes the <code>funcname</code> argument containing a string exceeding the buffer size allocated to it.</li>
<li>The <code>fromSetCfm</code> function processes the malicious <code>funcname</code> argument without proper bounds checking.</li>
<li>The oversized <code>funcname</code> value overflows the stack buffer, overwriting adjacent memory regions.</li>
<li>The attacker overwrites the return address on the stack with an address pointing to malicious code or a ROP chain.</li>
<li>The <code>fromSetCfm</code> function returns, causing execution to jump to the attacker-controlled address.</li>
<li>The attacker gains arbitrary code execution on the device, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the affected Tenda CH22 device. This can result in complete device compromise, allowing the attacker to control the device, steal sensitive information, or use the device as a foothold for further attacks on the network. Given the availability of public exploits, a large number of devices could be compromised if left unpatched.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/setcfm</code> with unusually long <code>funcname</code> parameters, using the provided Sigma rule.</li>
<li>Implement rate limiting on requests to <code>/goform/setcfm</code> to mitigate potential brute-force exploitation attempts.</li>
<li>Apply any available patches or firmware updates from Tenda to address CVE-2026-5154.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5154</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda FH1201 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5046)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-overflow/</link><pubDate>Sun, 29 Mar 2026 15:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5046) in Tenda FH1201 version 1.2.0.14(408) allows remote attackers to execute arbitrary code by manipulating the GO argument in the formWrlExtraSet function of the /goform/WrlExtraSet component.</description><content:encoded><![CDATA[<p>CVE-2026-5046 is a stack-based buffer overflow vulnerability affecting Tenda FH1201 routers running firmware version 1.2.0.14(408). The vulnerability resides within the <code>formWrlExtraSet</code> function of the <code>/goform/WrlExtraSet</code> component, specifically in the handling of the <code>GO</code> argument. A remote attacker can exploit this flaw by sending a crafted HTTP request with a maliciously oversized <code>GO</code> parameter, overwriting the stack and potentially gaining arbitrary code execution on the device. The…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5046</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda 4G06 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5036)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-4g06-bo/</link><pubDate>Sun, 29 Mar 2026 08:15:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-4g06-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5036) exists in the fromDhcpListClient function of the Tenda 4G06 router (version 04.06.01.29), potentially allowing remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/DhcpListClient endpoint.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-5036, affects the Tenda 4G06 router, specifically version 04.06.01.29. The vulnerability resides in the <code>fromDhcpListClient</code> function within the <code>/goform/DhcpListClient</code> endpoint. A remote attacker can exploit this by crafting a malicious request that manipulates the <code>page</code> argument, leading to a buffer overflow on the stack. This could allow the attacker to potentially execute arbitrary code on the device. Given the…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5036</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item><item><title>Tenda AC15 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4975)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac15-bo/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac15-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4975) exists in the Tenda AC15 router version 15.03.05.19, allowing remote attackers to execute arbitrary code by manipulating the 'funcpara1' argument in a POST request to /goform/setcfm.</description><content:encoded><![CDATA[<p>CVE-2026-4975 is a critical security vulnerability affecting Tenda AC15 routers running firmware version 15.03.05.19. This vulnerability resides in the <code>formSetCfm</code> function, specifically within the <code>/goform/setcfm</code> file, which handles POST requests. An attacker can exploit a stack-based buffer overflow by sending a crafted POST request with a malicious payload in the <code>funcpara1</code> argument. The vulnerability is remotely exploitable, meaning an attacker does not need local access to the device…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer overflow</category><category>cve-2026-4975</category></item><item><title>Tenda AC6 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac6-overflow/</link><pubDate>Fri, 27 Mar 2026 17:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac6-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda AC6 version 15.03.05.16 allows remote attackers to execute arbitrary code by manipulating the WANT/WANS argument in the /goform/WizardHandle POST request handler.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda AC6 router firmware version 15.03.05.16. The vulnerability, tracked as CVE-2026-4960, resides within the <code>fromWizardHandle</code> function of the <code>/goform/WizardHandle</code> component, which handles POST requests. A remote attacker can exploit this vulnerability by sending a crafted POST request with a manipulated <code>WANT</code> or <code>WANS</code> argument, leading to arbitrary code execution on the device. Public exploit code is available, increasing the risk of widespread exploitation. This vulnerability poses a significant threat, potentially allowing attackers to gain complete control over vulnerable routers and compromise connected networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda AC6 router running firmware version 15.03.05.16.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/goform/WizardHandle</code> endpoint.</li>
<li>Within the POST request, the attacker manipulates the <code>WANT</code> or <code>WANS</code> argument to inject a payload exceeding the buffer size.</li>
<li>The router processes the POST request, passing the attacker-controlled input to the vulnerable <code>fromWizardHandle</code> function.</li>
<li>The overflow occurs when the <code>fromWizardHandle</code> function copies the attacker-supplied data into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>The injected payload overwrites adjacent memory locations on the stack, including the return address.</li>
<li>When the <code>fromWizardHandle</code> function returns, it jumps to the attacker-controlled address.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the affected Tenda AC6 router. This can lead to a variety of malicious outcomes, including network hijacking, DNS poisoning, interception of network traffic, deployment of malware, and the creation of botnets. Given the widespread use of Tenda routers in home and small business networks, a large number of devices are potentially vulnerable. The CVSS v3.1 score of 8.8 reflects the high severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-4960.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/WizardHandle</code> with abnormally long <code>WANT</code> or <code>WANS</code> parameters using the Sigma rule provided below.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect exploit attempts targeting the <code>/goform/WizardHandle</code> endpoint.</li>
<li>Restrict access to the router&rsquo;s web interface from the public internet where possible to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4960</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda AC5 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4903)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-bo/</link><pubDate>Fri, 27 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-bo/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda AC5 version 15.03.06.47, allowing remote attackers to execute arbitrary code by manipulating the `PPPOEPassword` argument in the `formQuickIndex` function of the `/goform/QuickIndex` component.</description><content:encoded><![CDATA[<p>CVE-2026-4903 describes a critical stack-based buffer overflow vulnerability affecting Tenda AC5 routers, specifically version 15.03.06.47. The vulnerability resides within the <code>formQuickIndex</code> function of the <code>/goform/QuickIndex</code> component, which handles POST requests. An attacker can remotely exploit this vulnerability by crafting a malicious POST request to <code>/goform/QuickIndex</code> with an overly long <code>PPPOEPassword</code> argument. This overflow allows the attacker to potentially overwrite adjacent…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4903</category><category>buffer-overflow</category><category>tenda</category></item><item><title>Tenda AC5 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-overflow/</link><pubDate>Fri, 27 Mar 2026 00:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4905) exists in Tenda AC5 firmware version 15.03.06.47 allowing remote attackers to execute arbitrary code by manipulating the 'index' argument in a POST request to the /goform/WifiWpsOOB endpoint.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-4905, has been discovered in Tenda AC5 home routers running firmware version 15.03.06.47. The vulnerability resides within the <code>formWifiWpsOOB</code> function in the <code>/goform/WifiWpsOOB</code> file, which handles POST requests. Attackers can remotely exploit this flaw by crafting a malicious POST request to this endpoint, specifically targeting the <code>index</code> argument. Successful exploitation leads to arbitrary code execution on the device…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>cve-2026-4905</category></item><item><title>Tenda F453 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-4553)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-stack-overflow/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-stack-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda F453 version 1.0.0.3 in the fromNatlimit function of the /goform/Natlimit Parameters Handler component, triggered remotely by manipulating the 'page' argument, allowing for potential arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, tracked as CVE-2026-4553, has been identified in Tenda F453 version 1.0.0.3. The flaw resides within the <code>fromNatlimit</code> function of the <code>/goform/Natlimit</code> component&rsquo;s Parameters Handler. Publicly available exploits exist, increasing the risk of exploitation. Successful exploitation could allow an attacker to execute arbitrary code on the affected device. This vulnerability poses a significant threat to users of the Tenda F453 router, potentially…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4553</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda A15 Router Stack-Based Buffer Overflow (CVE-2026-4567)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-a15-bo/</link><pubDate>Mon, 23 Mar 2026 03:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-a15-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4567) exists in the UploadCfg function of the /cgi-bin/UploadCfg file in Tenda A15 firmware version 15.13.07.13, allowing remote attackers to execute arbitrary code by manipulating the File argument.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-4567, has been discovered in Tenda A15 wireless routers running firmware version 15.13.07.13. The vulnerability resides in the <code>UploadCfg</code> function within the <code>/cgi-bin/UploadCfg</code> file, which handles file uploads.  A remote attacker can exploit this flaw by crafting a malicious request to the router, specifically targeting the <code>File</code> argument, to overwrite the stack buffer and potentially gain arbitrary code execution…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4567</category><category>stack-based buffer overflow</category><category>tenda</category><category>router</category><category>remote code execution</category></item><item><title>Tenda AC21 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac21-buffer-overflow/</link><pubDate>Mon, 23 Mar 2026 01:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac21-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Tenda AC21 firmware version 16.03.08.16, allowing remote attackers to execute arbitrary code by manipulating arguments to the formSetQosBand function.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-4565, affects Tenda AC21 routers running firmware version 16.03.08.16. The flaw resides in the <code>formSetQosBand</code> function within the <code>/goform/SetNetControlList</code> file. Attackers can exploit this vulnerability by crafting malicious argument lists in HTTP requests, leading to arbitrary code execution on the device. The vulnerability can be exploited remotely and a proof-of-concept exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation allows attackers to gain complete control over the router, potentially compromising connected devices and network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda AC21 router with firmware version 16.03.08.16.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SetNetControlList</code> endpoint.</li>
<li>The POST request includes a specially crafted argument list designed to overflow the buffer in the <code>formSetQosBand</code> function.</li>
<li>The router processes the HTTP request and passes the malicious arguments to the vulnerable function.</li>
<li>The <code>formSetQosBand</code> function attempts to copy the oversized argument list into a fixed-size buffer, triggering a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>The attacker gains control of the program execution flow and injects malicious code.</li>
<li>The injected code executes with elevated privileges, granting the attacker complete control over the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Tenda AC21 router. This can lead to a variety of malicious outcomes, including: complete device compromise, modification of router settings, interception of network traffic, deployment of malware to connected devices, and use of the router as a botnet node. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploit could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/SetNetControlList</code> with unusually long or malformed arguments (see rule: &ldquo;Detect Suspicious POST Requests to SetNetControlList&rdquo;).</li>
<li>Implement rate limiting on HTTP POST requests to prevent attackers from quickly exploiting the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda AC21 Buffer Overflow Attempt&rdquo; to identify exploitation attempts based on specific patterns in HTTP requests.</li>
<li>Consider blocking traffic from known exploit sources, if available.</li>
<li>Upgrade to a patched firmware version as soon as it becomes available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>ac21</category><category>buffer_overflow</category><category>cve-2026-4565</category><category>router</category></item><item><title>Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</guid><description>Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.</description><content:encoded><![CDATA[<p>CVE-2018-25318 affects Tenda FH303/A300 routers running firmware version V5.07.68_EN. This vulnerability stems from a session weakness related to insufficient cookie validation. An unauthenticated attacker can exploit this flaw to modify the DNS settings of the router. By sending a crafted GET request to the <code>/goform/AdvSetDns</code> endpoint, an attacker can inject a malicious admin cookie. This allows them to overwrite the configured DNS servers, potentially redirecting all network traffic from connected devices through attacker-controlled infrastructure. This can lead to phishing attacks, malware distribution, and other malicious activities. The vulnerability poses a significant risk to home and small office networks using the affected Tenda routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda FH303/A300 router running firmware V5.07.68_EN.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a forged admin cookie, bypassing authentication checks due to the session weakness.</li>
<li>The attacker sends the crafted GET request to the router&rsquo;s management interface.</li>
<li>The router, due to insufficient cookie validation, accepts the forged cookie and processes the request.</li>
<li>The request modifies the DNS server settings on the router, replacing the legitimate DNS servers with attacker-controlled DNS servers.</li>
<li>Users connected to the router unknowingly use the attacker&rsquo;s DNS servers for name resolution.</li>
<li>DNS requests are redirected to malicious IPs controlled by the attacker, potentially leading to phishing sites or malware downloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25318 allows an attacker to perform DNS hijacking on affected Tenda routers. This can redirect users to malicious websites designed to steal credentials, distribute malware, or conduct other harmful activities. The vulnerability poses a critical risk to users of the affected routers, as it can compromise their online security and privacy. The CVSS v3.1 base score for this vulnerability is 9.8, highlighting its severity. The number of affected users is dependent on the number of deployed vulnerable devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/AdvSetDns</code> with unusual parameters (Sigma rule: &ldquo;Detect Tenda Router DNS Hijacking Attempt&rdquo;).</li>
<li>If possible, upgrade the router firmware to a version that patches CVE-2018-25318.</li>
<li>Implement network segmentation to limit the impact of compromised devices.</li>
<li>Consider using a reputable DNS service with built-in security features to mitigate the impact of DNS hijacking attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25318</category><category>tenda</category><category>dns-hijacking</category><category>network</category></item><item><title>Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-hg3-command-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-hg3-command-injection/</guid><description>A command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, identified as CVE-2026-7096, affects Tenda HG3 2.0 300003070 routers. The vulnerability resides in the &lsquo;formgponConf&rsquo; function within the &lsquo;/boaform/admin/formgponConf&rsquo; file. An attacker can exploit this flaw by manipulating the &lsquo;fmgpon_loid&rsquo; argument. Successful exploitation allows a remote attacker to execute arbitrary operating system commands on the affected device. Given the public availability of an exploit, Tenda HG3 devices are at immediate risk of compromise. This poses a significant threat as attackers can potentially gain full control of the router, compromise connected networks, and exfiltrate sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 300003070 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the &lsquo;/boaform/admin/formgponConf&rsquo; endpoint.</li>
<li>The attacker injects a payload containing OS commands into the &lsquo;fmgpon_loid&rsquo; parameter of the POST request.</li>
<li>The Tenda HG3 router&rsquo;s web server processes the request without proper input validation of the &lsquo;fmgpon_loid&rsquo; parameter.</li>
<li>The injected OS command is executed by the router&rsquo;s operating system with the privileges of the web server process.</li>
<li>The attacker gains remote code execution on the Tenda HG3 router.</li>
<li>The attacker may establish a reverse shell to maintain persistent access or download further malicious payloads.</li>
<li>The attacker can then pivot to internal networks, exfiltrate data, or use the compromised router for other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7096 grants attackers the ability to execute arbitrary OS commands on the Tenda HG3 router. This can lead to complete compromise of the device, allowing attackers to modify router settings, intercept network traffic, and potentially gain access to connected devices on the local network. Given the widespread use of Tenda routers in home and small business environments, a successful attack could impact thousands of users. The vulnerability&rsquo;s high CVSS score of 8.8 underscores the severity and potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo; to your SIEM to identify exploitation attempts by monitoring HTTP POST requests to &lsquo;/boaform/admin/formgponConf&rsquo; with suspicious commands in the &lsquo;fmgpon_loid&rsquo; parameter.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect malicious payloads in HTTP POST requests targeting the vulnerable endpoint, as described in the &ldquo;Attack Chain&rdquo; section.</li>
<li>While no specific IOCs are provided, analyze network traffic and web server logs for unusual activity originating from or targeting Tenda HG3 routers.</li>
<li>Monitor web server logs for HTTP POST requests to /boaform/admin/formgponConf (described in Attack Chain step 2).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>tenda</category></item><item><title>Tenda FH1202 Stack-Based Buffer Overflow Vulnerability (CVE-2026-7034)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-fh1202-bo/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-fh1202-bo/</guid><description>A stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically in the WrlExtraSet function, allowing remote attackers to execute arbitrary code by manipulating the 'Go' argument in a request to /goform/WrlExtraSet.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-7034, has been discovered in Tenda FH1202 version 1.2.0.14(408). The vulnerability resides within the <code>WrlExtraSet</code> function of the <code>/goform/WrlExtraSet</code> component, which is part of the device&rsquo;s <code>httpd</code> server. A remote attacker can exploit this vulnerability by crafting a malicious HTTP request that manipulates the <code>Go</code> argument, leading to arbitrary code execution on the affected device. The exploit for this vulnerability has been made public, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to users of the Tenda FH1202 router as it allows for complete compromise of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda FH1202 router exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlExtraSet</code> endpoint.</li>
<li>The crafted request includes a <code>Go</code> parameter with a payload exceeding the expected buffer size, triggering the stack-based buffer overflow.</li>
<li>The overflow overwrites critical return addresses on the stack.</li>
<li>The overwritten return address is redirected to malicious code injected by the attacker within the overflowed buffer.</li>
<li>The injected code executes with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains complete control of the device, potentially allowing for the installation of malware, modification of router settings, or interception of network traffic.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the Tenda FH1202 router. This can lead to a variety of malicious activities, including installing persistent backdoors, modifying DNS settings to redirect traffic, or using the compromised device as part of a botnet. The lack of required authentication for exploitation increases the severity, making it easily exploitable. While the exact number of affected devices is unknown, the widespread use of Tenda routers suggests a potentially large number of vulnerable targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/WrlExtraSet</code> with unusually long <code>Go</code> parameter values to detect potential exploitation attempts. Reference the Sigma rule <code>Detect Suspicious WrlExtraSet Requests</code>.</li>
<li>Implement rate limiting for requests to the <code>/goform/WrlExtraSet</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Consider blocking or alerting on requests to <code>/goform/WrlExtraSet</code> originating from outside the expected user base (e.g., requests originating from outside the country where the organization operates).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7034</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item></channel></rss>