Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5036: Stack-based Buffer Overflow in Tenda 4G06

0
High
VulnerabilityCVE-2026-5036cvecve-2026-5036
Published: Sun Mar 29 2026 (03/29/2026, 07:45:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: 4G06

Description

CVE-2026-5036 is a high-severity stack-based buffer overflow vulnerability in the Tenda 4G06 router firmware version 04. 06. 01. 29. The flaw exists in the fromDhcpListClient function within the /goform/DhcpListClient endpoint, where improper handling of the 'page' argument allows remote attackers to overflow the stack. Exploitation requires no user interaction or privileges and can be performed remotely over the network. Successful exploitation could lead to arbitrary code execution, compromising confidentiality, integrity, and availability of the device. Although no public exploits are currently observed in the wild, the exploit code has been made public, increasing risk. Organizations using affected Tenda 4G06 devices should prioritize patching or mitigating this vulnerability to prevent potential attacks. The vulnerability poses significant risk to networks relying on this router model, especially in regions with high deployment of Tenda products.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/29/2026, 08:15:26 UTC

Technical Analysis

CVE-2026-5036 identifies a stack-based buffer overflow vulnerability in the Tenda 4G06 router firmware version 04.06.01.29. The vulnerability resides in the fromDhcpListClient function of the /goform/DhcpListClient endpoint, part of the router's endpoint component. Specifically, the vulnerability is triggered by manipulating the 'page' argument passed to this function, which is not properly validated or bounds-checked, leading to a stack overflow condition. This overflow can overwrite critical control data on the stack, enabling an attacker to execute arbitrary code remotely. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote adversaries. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation (network attack vector, low complexity), lack of required privileges or user interaction, and the severe impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, the public availability of exploit code increases the likelihood of exploitation attempts. This vulnerability could allow attackers to take full control of affected devices, potentially leading to network compromise, data interception, or disruption of services. The affected product, Tenda 4G06, is a 4G LTE router commonly used in residential and small business environments, often deployed in regions where Tenda has market presence. The lack of an official patch link in the provided data suggests that mitigation or firmware updates may not yet be available, emphasizing the need for interim protective measures.

Potential Impact

The impact of CVE-2026-5036 is significant for organizations using Tenda 4G06 routers, as exploitation can lead to full device compromise. This includes unauthorized remote code execution, allowing attackers to control the device, intercept or manipulate network traffic, and potentially pivot to internal networks. Confidentiality is at risk due to possible data interception; integrity is compromised through unauthorized changes to device configuration or firmware; availability may be disrupted by device crashes or malicious reconfiguration. Given the router's role as a network gateway, exploitation could facilitate broader network intrusions or denial of service attacks. Small businesses and residential users relying on this device may face service outages or data breaches. The public availability of exploit code increases the risk of automated attacks and widespread exploitation, especially in environments where devices remain unpatched. The absence of authentication requirements and user interaction lowers the barrier for attackers, making this vulnerability particularly dangerous in exposed network environments.

Mitigation Recommendations

1. Immediate mitigation should include isolating affected Tenda 4G06 devices from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual activity targeting the /goform/DhcpListClient endpoint, particularly malformed requests manipulating the 'page' parameter. 3. Employ network-level protections such as firewalls or intrusion prevention systems (IPS) to block or alert on suspicious packets directed at the vulnerable endpoint. 4. Check with Tenda for firmware updates or security advisories addressing this vulnerability and apply patches promptly once available. 5. If patches are unavailable, consider replacing affected devices with models not vulnerable to this issue. 6. Implement network segmentation to limit the impact of a compromised device. 7. Regularly audit device configurations and logs for signs of compromise. 8. Educate users and administrators about the risk and signs of exploitation. 9. Disable remote management features if not required to reduce attack surface. 10. Use VPNs or secure tunnels for remote access to reduce direct exposure of vulnerable endpoints.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-27T16:16:15.050Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c8dc1a919ccadcdfea42e8

Added to database: 3/29/2026, 8:00:26 AM

Last enriched: 3/29/2026, 8:15:26 AM

Last updated: 3/29/2026, 9:00:39 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses