<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tenda — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/tenda/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 03:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/tenda/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda 4G300 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</link><pubDate>Thu, 30 Apr 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</guid><description>A remote stack-based buffer overflow vulnerability exists in the Tenda 4G300 router, version US_4G300V1.0Mt_V1.01.42_CN_TDC01, allowing an attacker to potentially execute arbitrary code by manipulating the 'page' argument to the sub_427C3C function in the /goform/SafeMacFilter file.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda 4G300 routers, specifically version US_4G300V1.0Mt_V1.01.42_CN_TDC01. The vulnerability resides within the <code>sub_427C3C</code> function located in the <code>/goform/SafeMacFilter</code> file. An attacker can exploit this flaw by manipulating the <code>page</code> argument in a crafted request, leading to a buffer overflow and potentially allowing for arbitrary code execution on the affected device. The vulnerability, identified as CVE-2026-7470, poses a significant risk as remote exploitation is possible, and a proof-of-concept exploit is publicly available, increasing the likelihood of malicious actors leveraging this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda 4G300 router running the vulnerable firmware version US_4G300V1.0Mt_V1.01.42_CN_TDC01.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeMacFilter</code> endpoint.</li>
<li>The crafted request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>sub_427C3C</code> function.</li>
<li>The router processes the HTTP request, passing the oversized <code>page</code> argument to the vulnerable function.</li>
<li>The <code>sub_427C3C</code> function attempts to write the oversized data into a stack-based buffer, causing a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory on the stack, including the return address.</li>
<li>The attacker redirects execution flow to a malicious code payload injected into the request or elsewhere in memory.</li>
<li>The injected code executes with the privileges of the router process, potentially allowing the attacker to gain full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda 4G300 router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a launching point for further attacks against other devices on the network or the internet. Given the widespread use of these routers in homes and small businesses, a successful attack could impact a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/goform/SafeMacFilter</code> with abnormally long <code>page</code> parameters. Use the provided Sigma rule to detect suspicious activity.</li>
<li>Implement rate limiting on the <code>/goform/SafeMacFilter</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7470.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>cve-2026-7470</category></item><item><title>Tenda W308R DNS Hijacking Vulnerability (CVE-2018-25316)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</guid><description>Tenda W308R v2 V5.07.48 is vulnerable to cookie session weakness, allowing unauthenticated attackers to modify DNS settings via crafted GET requests to redirect user traffic to malicious sites.</description><content:encoded><![CDATA[<p>Tenda W308R v2 running firmware V5.07.48 is susceptible to a cookie session weakness (CVE-2018-25316) that enables unauthenticated attackers to perform DNS hijacking. This vulnerability stems from insufficient session validation. An attacker can exploit this weakness by sending specially crafted GET requests to the <code>goform/AdvSetDns</code> endpoint. The malicious request includes a crafted admin language cookie, which bypasses authentication checks and allows modification of the device&rsquo;s DNS server settings. Successful exploitation allows the attacker to redirect the router&rsquo;s DNS queries to a malicious server under their control. This poses a significant risk to end-users, as it can lead to phishing attacks, malware distribution, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda W308R v2 router running firmware V5.07.48 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>goform/AdvSetDns</code> endpoint.</li>
<li>The GET request includes a crafted &ldquo;admin language cookie&rdquo; designed to bypass authentication.</li>
<li>The router receives the malicious GET request and, due to insufficient session validation, incorrectly authenticates the attacker.</li>
<li>The router processes the malicious request, modifying the DNS server settings to attacker-controlled DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker&rsquo;s DNS server redirects users to malicious websites, potentially serving malware or phishing pages.</li>
<li>Users unknowingly interact with the malicious content, leading to data theft, system compromise, or other harmful outcomes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to control DNS resolution for all devices connected to the affected Tenda W308R v2 router. This can lead to widespread redirection to phishing sites designed to steal credentials, or to sites hosting malware that infects user devices. Given the widespread use of Tenda routers, this vulnerability could impact a large number of home and small business networks. A successful attack allows the attacker to perform man-in-the-middle attacks, eavesdrop on network traffic, and compromise connected devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Hijack Attempt</code> to identify attempts to exploit this vulnerability by monitoring for suspicious requests to the <code>/goform/AdvSetDns</code> endpoint (log source: webserver).</li>
<li>Monitor web server logs for requests containing a crafted admin language cookie to the <code>/goform/AdvSetDns</code> endpoint, indicating potential exploitation attempts (log source: webserver).</li>
<li>Apply available patches or firmware updates from Tenda to address the cookie session weakness and prevent unauthorized DNS modifications.</li>
<li>Consider replacing the affected device if a patch is unavailable, especially in high-risk environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25316</category><category>dns-hijacking</category><category>tenda</category><category>cookie-injection</category></item><item><title>Tenda Router DNS Hijacking via Cookie Session Weakness</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijacking/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijacking/</guid><description>Tenda W3002R/A302/W309R routers with firmware V5.07.64_en are vulnerable to unauthenticated DNS hijacking, where attackers exploit a cookie session weakness to modify DNS settings via crafted GET requests.</description><content:encoded><![CDATA[<p>Tenda W3002R, A302, and W309R wireless routers running firmware version V5.07.64_en are susceptible to a cookie session weakness (CVE-2018-25317). This vulnerability allows unauthenticated attackers to remotely modify DNS settings on the affected devices. The attack exploits insufficient session validation, enabling malicious actors to inject commands and redirect user traffic to attacker-controlled DNS servers. This poses a significant risk as it can lead to phishing attacks, malware distribution, and credential theft. Exploitation is straightforward, requiring only a crafted HTTP GET request, making it accessible to unsophisticated attackers. The vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable Tenda router with firmware V5.07.64_en.</li>
<li>The attacker crafts an HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a malicious <code>admin language</code> cookie designed to bypass session validation.</li>
<li>The attacker injects modified DNS server addresses into the GET request parameters (primary DNS and secondary DNS).</li>
<li>The vulnerable router processes the malicious GET request without proper session validation.</li>
<li>The router updates its DNS settings to the attacker-specified DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker can redirect user traffic to malicious websites or intercept sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25317 allows attackers to perform DNS hijacking on vulnerable Tenda routers, potentially affecting all connected users. By controlling the DNS server, attackers can redirect users to phishing sites, distribute malware, or intercept sensitive communications. Given the ease of exploitation, a large number of routers could be compromised, leading to widespread disruption and data theft. The severity is heightened because no authentication is required to change the DNS settings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Setting Modification</code> to monitor web server logs for requests to the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>Apply network-level filtering to block connections to known malicious DNS servers based on threat intelligence feeds.</li>
<li>Although no firmware update is available, consider replacing end-of-life Tenda routers (W3002R/A302/W309R with V5.07.64_en) with more secure models.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25317</category><category>dns-hijacking</category><category>router-vulnerability</category></item><item><title>Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</guid><description>A stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda HG3 version 2.0. The vulnerability exists within the <code>formUploadConfig</code> function of the <code>/boaform/formIPv6Routing</code> file. A remote attacker can exploit this by manipulating the <code>destNet</code> argument, potentially leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-7151, has a publicly available exploit, increasing the risk of exploitation. This poses a significant threat to users of Tenda HG3 v2.0 routers, potentially allowing attackers to gain unauthorized access and control over the device. The CVSS v3.1 score is rated as 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda HG3 v2.0 router with default or known credentials, or no authentication at all.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/boaform/formIPv6Routing</code>.</li>
<li>The request targets the <code>formUploadConfig</code> function.</li>
<li>The <code>destNet</code> argument within the HTTP POST data is manipulated with a string exceeding the buffer size.</li>
<li>The <code>formUploadConfig</code> function processes the oversized <code>destNet</code> argument without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions on the stack.</li>
<li>The attacker gains arbitrary code execution on the device by overwriting the return address or other critical data on the stack.</li>
<li>The attacker can then leverage this to gain full control of the device, potentially modifying settings, injecting malware, or using it as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda HG3 v2.0 router. This could lead to complete compromise of the device, allowing the attacker to monitor network traffic, change router settings, or use the device as a launchpad for further attacks against other devices on the network. Given the potential for widespread exploitation due to the publicly available exploit, a large number of Tenda HG3 v2.0 users are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/boaform/formIPv6Routing</code> with excessively long <code>destNet</code> parameters to detect potential exploit attempts (see example Sigma rule below).</li>
<li>Implement rate limiting for requests to <code>/boaform/formIPv6Routing</code> to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches or firmware updates from Tenda to address CVE-2026-7151 on vulnerable HG3 2.0 devices.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting the <code>destNet</code> parameter in <code>/boaform/formIPv6Routing</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7151</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda HG3 2.0 Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</link><pubDate>Mon, 27 Apr 2026 22:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</guid><description>Tenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.</description><content:encoded><![CDATA[<p>Tenda HG3 2.0 is vulnerable to a command injection vulnerability (CVE-2026-7160) affecting the formTracert function in the /boaform/formTracert file. A remote attacker can exploit this by manipulating the datasize argument to inject arbitrary commands into the system. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. Public disclosure and potential exploitation make this a critical issue for users of the Tenda HG3 2.0 router. Successful exploitation allows an attacker to execute arbitrary commands on the device, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the /boaform/formTracert endpoint.</li>
<li>The malicious request includes a manipulated datasize argument designed to inject a command.</li>
<li>The web server processes the request and passes the manipulated datasize argument to the formTracert function.</li>
<li>The formTracert function fails to properly sanitize the input, allowing the injected command to be executed by the system.</li>
<li>The injected command executes with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary commands on the Tenda HG3 2.0 router. This can lead to complete compromise of the device, including modification of router settings, interception of network traffic, and potential use of the router as a botnet node. Given the high base score of 8.8, this poses a significant risk to affected users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-7160.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/boaform/formTracert</code> with unusual <code>datasize</code> parameters, as covered by the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo;.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block exploit attempts targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-7160</category><category>tenda</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability (CVE-2026-7101)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</link><pubDate>Mon, 27 Apr 2026 09:19:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 version 1.0.0.5 allows remote attackers to execute arbitrary code via a crafted request to the fromWrlclientSet function in the /goform/WrlclientSet file of the httpd component.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7101, has been discovered in Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromWrlclientSet</code> function within the <code>/goform/WrlclientSet</code> file, which is part of the router&rsquo;s httpd component. Successful exploitation allows remote attackers to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to home and small business networks using the affected Tenda router model, potentially leading to complete device compromise and unauthorized network access. The vulnerability was published on 2026-04-27 and is tracked by VulDB.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda F456 router running firmware version 1.0.0.5.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>The crafted request includes an oversized payload designed to overflow the buffer in the <code>fromWrlclientSet</code> function.</li>
<li>The <code>httpd</code> process attempts to process the request without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions, including critical program data and execution pointers.</li>
<li>The attacker gains control of the program execution flow.</li>
<li>The attacker executes arbitrary code on the router, potentially including shell commands or custom malware.</li>
<li>The attacker achieves complete control of the router, potentially enabling network reconnaissance, data exfiltration, or further attacks on the local network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda F456 router. This can lead to complete device compromise, allowing the attacker to control network traffic, modify router settings, or use the compromised device as a pivot point for further attacks within the network. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploitation could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched firmware version if available from the vendor.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/goform/WrlclientSet</code> endpoint using the provided Sigma rule.</li>
<li>Implement an IPS rule to detect and block exploit attempts targeting CVE-2026-7101.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7101</category><category>buffer-overflow</category><category>router</category><category>tenda</category><category>remote-code-execution</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-bo/</link><pubDate>Mon, 27 Apr 2026 04:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-bo/</guid><description>A buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 in the `fromGstDhcpSetSer` function, allowing remote attackers to execute arbitrary code by manipulating the 'dips' argument via a crafted HTTP request to `/goform/GstDhcpSetSer`.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7081, affects Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromGstDhcpSetSer</code> function within the <code>/goform/GstDhcpSetSer</code> file, a component of the device&rsquo;s httpd service. Successful exploitation allows a remote attacker to execute arbitrary code on the device. Publicly available exploit code increases the risk of widespread exploitation. This vulnerability poses a significant threat as it can lead to complete compromise of the affected device, potentially allowing attackers to gain unauthorized access to the network, steal sensitive information, or use the device as part of a botnet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda F456 router (version 1.0.0.5) exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/GstDhcpSetSer</code> endpoint.</li>
<li>The HTTP request includes the <code>dips</code> argument, which is intentionally oversized to trigger the buffer overflow.</li>
<li>The vulnerable <code>fromGstDhcpSetSer</code> function processes the request without proper bounds checking.</li>
<li>The oversized <code>dips</code> argument overwrites adjacent memory regions on the stack.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address with an address pointing to attacker-controlled code.</li>
<li>The <code>fromGstDhcpSetSer</code> function returns, causing execution to jump to the attacker&rsquo;s code.</li>
<li>The attacker&rsquo;s code executes with the privileges of the httpd process, potentially leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F456 router. This can result in complete device compromise, including the ability to modify device settings, intercept network traffic, and potentially use the compromised device as a pivot point for further attacks within the network. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, making this a significant security concern.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/GstDhcpSetSer</code> with unusually long <code>dips</code> parameter values to detect potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule <code>Detect Tenda F456 Buffer Overflow Attempt</code> to identify malicious HTTP requests.</li>
<li>Since no patch is available, consider replacing the affected Tenda F456 routers (version 1.0.0.5) with more secure alternatives.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>router</category></item><item><title>Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-path-traversal/</link><pubDate>Sun, 26 Apr 2026 12:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-path-traversal/</guid><description>CVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7036, exists in Tenda i9 version 1.0.0.5(2204). Specifically, the vulnerability resides in the R7WebsSecurityHandlerfunction of the HTTP Handler component. This flaw allows a remote, unauthenticated attacker to potentially access sensitive files and directories on the affected device. The vulnerability was reported on 2026-04-26, and a public exploit is reportedly available, increasing the risk of exploitation. This poses a significant threat to organizations using the affected Tenda i9 router, as it could lead to unauthorized access to sensitive information or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Tenda i9 router running firmware version 1.0.0.5(2204) accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable R7WebsSecurityHandlerfunction.</li>
<li>The crafted request includes a path traversal sequence (e.g., &ldquo;../&rdquo;) within the URL or request parameters.</li>
<li>The Tenda i9 router processes the malicious request without proper sanitization of the path.</li>
<li>The R7WebsSecurityHandlerfunction incorrectly interprets the path traversal sequence, allowing access to files or directories outside the intended web root.</li>
<li>The attacker gains unauthorized access to sensitive files, such as configuration files or system logs.</li>
<li>The attacker may use the exposed information to further compromise the device or the network it is connected to.</li>
<li>The attacker could potentially modify system files or execute commands, leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7036 can lead to unauthorized access to sensitive files on the Tenda i9 router. This includes configuration files containing credentials, system logs, or other confidential data. An attacker could leverage this access to gain further control of the device, potentially leading to a complete system compromise. While the number of affected devices is currently unknown, given the widespread use of Tenda routers, the potential impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect HTTP requests containing path traversal sequences targeting web servers to detect exploitation attempts (Sigma rule: &ldquo;Detect Tenda i9 Path Traversal Attempt&rdquo;).</li>
<li>Since the source mentions a public exploit exists, prioritize patching or replacing vulnerable Tenda i9 routers to remediate CVE-2026-7036 immediately, if a patch becomes available.</li>
<li>Monitor web server logs for unusual file access patterns or requests containing suspicious path traversal sequences.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7036</category><category>path-traversal</category><category>tenda</category><category>network</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-buffer-overflow/</link><pubDate>Sun, 26 Apr 2026 11:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 router version 1.0.0.5 allows a remote attacker to execute arbitrary code by exploiting the fromSafeClientFilter function in the /goform/SafeClientFilter endpoint through manipulation of the 'menufacturer/Go' argument.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Tenda F456 router, specifically version 1.0.0.5. The vulnerability resides within the <code>fromSafeClientFilter</code> function located in the <code>/goform/SafeClientFilter</code> file. Successful exploitation allows a remote attacker to inject and execute arbitrary code. Publicly available exploit code exists, increasing the risk of widespread exploitation targeting vulnerable Tenda F456 devices. This issue poses a significant threat to network security, as a compromised router can lead to data breaches, denial of service, or further network intrusion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda F456 router running firmware version 1.0.0.5 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeClientFilter</code> endpoint.</li>
<li>The crafted request includes a specially designed payload within the <code>menufacturer/Go</code> argument. This payload is designed to trigger a buffer overflow in the <code>fromSafeClientFilter</code> function.</li>
<li>The <code>fromSafeClientFilter</code> function processes the malicious input without proper bounds checking.</li>
<li>The oversized payload overwrites adjacent memory regions, potentially including return addresses or other critical data.</li>
<li>When the <code>fromSafeClientFilter</code> function attempts to return, the overwritten return address is used, redirecting execution flow to attacker-controlled memory.</li>
<li>The attacker-controlled memory contains shellcode or other malicious instructions.</li>
<li>The router executes the attacker&rsquo;s code, granting the attacker control over the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can result in complete compromise of the Tenda F456 router. An attacker can gain unauthorized access to network traffic, modify router settings, or use the compromised device as a launchpad for further attacks within the network. Given the public availability of exploit code, a large number of Tenda F456 routers could be targeted, potentially affecting numerous home and small business networks. A successful attack could lead to data theft, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7033 on the F456 1.0.0.5 routers.</li>
<li>Implement network intrusion detection systems (IDS) or intrusion prevention systems (IPS) rules to detect and block malicious requests targeting the <code>/goform/SafeClientFilter</code> endpoint.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/SafeClientFilter</code> with abnormally large <code>menufacturer/Go</code> argument values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7033</category><category>router</category></item><item><title>Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</link><pubDate>Sat, 25 Apr 2026 18:18:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</guid><description>A buffer overflow vulnerability in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon allows remote attackers to execute arbitrary code by manipulating the nextHop argument in the formRoute function of the /boaform/formRouting file, impacting device availability and integrity.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-6988, has been discovered in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. The vulnerability resides within the Boa Service, specifically affecting the <code>formRoute</code> function located in the <code>/boaform/formRouting</code> file. Successful exploitation of this flaw enables a remote attacker to overwrite memory by crafting a malicious request with a manipulated <code>nextHop</code> argument. This can lead to arbitrary code execution on the affected device. Given the potential for remote exploitation and the availability of a published exploit, this vulnerability poses a significant threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device with the vulnerable Boa web service exposed.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/boaform/formRouting</code> endpoint.</li>
<li>The crafted request includes a specially crafted <code>nextHop</code> argument, exceeding the buffer size allocated for it.</li>
<li>The Boa service processes the request without proper bounds checking on the <code>nextHop</code> argument.</li>
<li>The oversized <code>nextHop</code> argument overwrites adjacent memory regions, including critical program data or return addresses.</li>
<li>The overwritten return address redirects execution flow to attacker-controlled code.</li>
<li>The attacker executes arbitrary code on the device with the privileges of the Boa service.</li>
<li>The attacker gains control of the device, potentially leading to data exfiltration, device hijacking, or further network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6988 can lead to complete compromise of the affected Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device. This may result in unauthorized access to the device&rsquo;s configuration, sensitive data exposure, or the device being used as a bot in a larger attack. Given that this device is likely used in home or small business environments, a successful attack could lead to significant data breaches, financial losses, and reputational damage. The availability of a public exploit increases the likelihood of widespread exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates released by Tenda to address CVE-2026-6988 as soon as possible.</li>
<li>Implement network segmentation to limit the exposure of Tenda devices to the internet or untrusted networks.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/boaform/formRouting</code> endpoint to detect potential exploit attempts (webserver log source).</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG10 Buffer Overflow Attempt&rdquo; to identify malicious HTTP requests exploiting the <code>nextHop</code> argument (Sigma rule).</li>
<li>Implement rate limiting on the <code>/boaform/formRouting</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>cve-2026-6988</category><category>tenda</category><category>iot</category></item><item><title>Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</guid><description>Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.</description><content:encoded><![CDATA[<p>CVE-2018-25318 affects Tenda FH303/A300 routers running firmware version V5.07.68_EN. This vulnerability stems from a session weakness related to insufficient cookie validation. An unauthenticated attacker can exploit this flaw to modify the DNS settings of the router. By sending a crafted GET request to the <code>/goform/AdvSetDns</code> endpoint, an attacker can inject a malicious admin cookie. This allows them to overwrite the configured DNS servers, potentially redirecting all network traffic from connected devices through attacker-controlled infrastructure. This can lead to phishing attacks, malware distribution, and other malicious activities. The vulnerability poses a significant risk to home and small office networks using the affected Tenda routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda FH303/A300 router running firmware V5.07.68_EN.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a forged admin cookie, bypassing authentication checks due to the session weakness.</li>
<li>The attacker sends the crafted GET request to the router&rsquo;s management interface.</li>
<li>The router, due to insufficient cookie validation, accepts the forged cookie and processes the request.</li>
<li>The request modifies the DNS server settings on the router, replacing the legitimate DNS servers with attacker-controlled DNS servers.</li>
<li>Users connected to the router unknowingly use the attacker&rsquo;s DNS servers for name resolution.</li>
<li>DNS requests are redirected to malicious IPs controlled by the attacker, potentially leading to phishing sites or malware downloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25318 allows an attacker to perform DNS hijacking on affected Tenda routers. This can redirect users to malicious websites designed to steal credentials, distribute malware, or conduct other harmful activities. The vulnerability poses a critical risk to users of the affected routers, as it can compromise their online security and privacy. The CVSS v3.1 base score for this vulnerability is 9.8, highlighting its severity. The number of affected users is dependent on the number of deployed vulnerable devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/AdvSetDns</code> with unusual parameters (Sigma rule: &ldquo;Detect Tenda Router DNS Hijacking Attempt&rdquo;).</li>
<li>If possible, upgrade the router firmware to a version that patches CVE-2018-25318.</li>
<li>Implement network segmentation to limit the impact of compromised devices.</li>
<li>Consider using a reputable DNS service with built-in security features to mitigate the impact of DNS hijacking attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25318</category><category>tenda</category><category>dns-hijacking</category><category>network</category></item><item><title>Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-hg3-command-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-hg3-command-injection/</guid><description>A command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, identified as CVE-2026-7096, affects Tenda HG3 2.0 300003070 routers. The vulnerability resides in the &lsquo;formgponConf&rsquo; function within the &lsquo;/boaform/admin/formgponConf&rsquo; file. An attacker can exploit this flaw by manipulating the &lsquo;fmgpon_loid&rsquo; argument. Successful exploitation allows a remote attacker to execute arbitrary operating system commands on the affected device. Given the public availability of an exploit, Tenda HG3 devices are at immediate risk of compromise. This poses a significant threat as attackers can potentially gain full control of the router, compromise connected networks, and exfiltrate sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 300003070 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the &lsquo;/boaform/admin/formgponConf&rsquo; endpoint.</li>
<li>The attacker injects a payload containing OS commands into the &lsquo;fmgpon_loid&rsquo; parameter of the POST request.</li>
<li>The Tenda HG3 router&rsquo;s web server processes the request without proper input validation of the &lsquo;fmgpon_loid&rsquo; parameter.</li>
<li>The injected OS command is executed by the router&rsquo;s operating system with the privileges of the web server process.</li>
<li>The attacker gains remote code execution on the Tenda HG3 router.</li>
<li>The attacker may establish a reverse shell to maintain persistent access or download further malicious payloads.</li>
<li>The attacker can then pivot to internal networks, exfiltrate data, or use the compromised router for other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7096 grants attackers the ability to execute arbitrary OS commands on the Tenda HG3 router. This can lead to complete compromise of the device, allowing attackers to modify router settings, intercept network traffic, and potentially gain access to connected devices on the local network. Given the widespread use of Tenda routers in home and small business environments, a successful attack could impact thousands of users. The vulnerability&rsquo;s high CVSS score of 8.8 underscores the severity and potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo; to your SIEM to identify exploitation attempts by monitoring HTTP POST requests to &lsquo;/boaform/admin/formgponConf&rsquo; with suspicious commands in the &lsquo;fmgpon_loid&rsquo; parameter.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect malicious payloads in HTTP POST requests targeting the vulnerable endpoint, as described in the &ldquo;Attack Chain&rdquo; section.</li>
<li>While no specific IOCs are provided, analyze network traffic and web server logs for unusual activity originating from or targeting Tenda HG3 routers.</li>
<li>Monitor web server logs for HTTP POST requests to /boaform/admin/formgponConf (described in Attack Chain step 2).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>tenda</category></item><item><title>Tenda FH1202 Stack-Based Buffer Overflow Vulnerability (CVE-2026-7034)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-fh1202-bo/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-fh1202-bo/</guid><description>A stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically in the WrlExtraSet function, allowing remote attackers to execute arbitrary code by manipulating the 'Go' argument in a request to /goform/WrlExtraSet.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-7034, has been discovered in Tenda FH1202 version 1.2.0.14(408). The vulnerability resides within the <code>WrlExtraSet</code> function of the <code>/goform/WrlExtraSet</code> component, which is part of the device&rsquo;s <code>httpd</code> server. A remote attacker can exploit this vulnerability by crafting a malicious HTTP request that manipulates the <code>Go</code> argument, leading to arbitrary code execution on the affected device. The exploit for this vulnerability has been made public, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to users of the Tenda FH1202 router as it allows for complete compromise of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda FH1202 router exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlExtraSet</code> endpoint.</li>
<li>The crafted request includes a <code>Go</code> parameter with a payload exceeding the expected buffer size, triggering the stack-based buffer overflow.</li>
<li>The overflow overwrites critical return addresses on the stack.</li>
<li>The overwritten return address is redirected to malicious code injected by the attacker within the overflowed buffer.</li>
<li>The injected code executes with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains complete control of the device, potentially allowing for the installation of malware, modification of router settings, or interception of network traffic.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the Tenda FH1202 router. This can lead to a variety of malicious activities, including installing persistent backdoors, modifying DNS settings to redirect traffic, or using the compromised device as part of a botnet. The lack of required authentication for exploitation increases the severity, making it easily exploitable. While the exact number of affected devices is unknown, the widespread use of Tenda routers suggests a potentially large number of vulnerable targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/WrlExtraSet</code> with unusually long <code>Go</code> parameter values to detect potential exploitation attempts. Reference the Sigma rule <code>Detect Suspicious WrlExtraSet Requests</code>.</li>
<li>Implement rate limiting for requests to the <code>/goform/WrlExtraSet</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Consider blocking or alerting on requests to <code>/goform/WrlExtraSet</code> originating from outside the expected user base (e.g., requests originating from outside the country where the organization operates).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7034</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item><item><title>Tenda F456 Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-f456-buffer-overflow/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-f456-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 via manipulation of the 'page' argument in the fromDhcpListClient function of the /goform/DhcpListClient component, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7098, has been discovered in Tenda F456 router version 1.0.0.5. The vulnerability resides within the <code>fromDhcpListClient</code> function of the <code>/goform/DhcpListClient</code> component&rsquo;s <code>httpd</code> service. An attacker can exploit this flaw by remotely manipulating the <code>page</code> argument, leading to a buffer overflow. Publicly available exploit code exists, increasing the risk of widespread exploitation. Successful exploitation could allow an attacker to execute arbitrary code on the device, potentially gaining full control of the router and the network it serves. This poses a significant threat to home and small business users relying on these routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F456 router (version 1.0.0.5) accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/DhcpListClient</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a payload designed to overflow the buffer in the <code>fromDhcpListClient</code> function.</li>
<li>The <code>httpd</code> service processes the request and calls the <code>fromDhcpListClient</code> function.</li>
<li>Due to insufficient bounds checking, the oversized payload overwrites the buffer, potentially overwriting adjacent memory regions.</li>
<li>The attacker&rsquo;s payload overwrites the return address on the stack with a pointer to attacker-controlled code.</li>
<li>The <code>fromDhcpListClient</code> function returns, causing execution to jump to the attacker-controlled code.</li>
<li>The attacker-controlled code executes with the privileges of the <code>httpd</code> service, potentially allowing for full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can allow a remote attacker to execute arbitrary code on the Tenda F456 router. This could lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the router as a pivot point for further attacks within the network. Given the ease of exploitation and public availability of exploit code, a large number of Tenda F456 users are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests to <code>/goform/DhcpListClient</code> with unusually long <code>page</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Tenda F456 Buffer Overflow Attempt&rdquo;).</li>
<li>Implement rate limiting on requests to the <code>/goform/DhcpListClient</code> endpoint to mitigate the impact of potential attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda F456 Buffer Overflow Response&rdquo; to identify successful exploitation attempts based on server response codes.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7098</category><category>buffer-overflow</category><category>router</category></item></channel></rss>