CVE-2026-5045: Stack-based Buffer Overflow in Tenda FH1201
CVE-2026-5045 is a high-severity stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1. 2. 0. 14(408). It affects the WrlclientSet function in the /goform/WrlclientSet parameter handler component. The vulnerability arises from improper handling of the GO argument, allowing remote attackers to trigger a stack-based buffer overflow without authentication or user interaction. Exploitation can lead to full compromise of the device, including potential remote code execution. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of attack. This vulnerability poses significant risks to organizations using Tenda FH1201 routers, especially in environments with exposed management interfaces. Immediate patching or mitigation is critical to prevent exploitation.
AI Analysis
Technical Summary
CVE-2026-5045 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14(408). The flaw exists in the WrlclientSet function within the /goform/WrlclientSet endpoint, part of the parameter handler component responsible for processing configuration inputs. Specifically, the vulnerability is triggered by manipulating the GO argument, which is improperly validated, leading to a stack-based buffer overflow condition. This type of vulnerability allows an attacker to overwrite the call stack, potentially enabling arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score is 8.7 (high severity), reflecting the ease of exploitation (network vector, low attack complexity), no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, a public exploit is available, increasing the likelihood of active exploitation attempts. The affected product, Tenda FH1201, is a consumer and small office/home office (SOHO) router, commonly used in various countries, which broadens the attack surface. The vulnerability's exploitation could allow attackers to gain control over the device, intercept or manipulate network traffic, or pivot into internal networks.
Potential Impact
The impact of CVE-2026-5045 is significant for organizations using Tenda FH1201 routers, particularly those with exposed management interfaces accessible from untrusted networks. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the device. This can result in interception of sensitive data, network traffic manipulation, creation of persistent backdoors, or launching further attacks against internal network resources. The compromise of such routers can undermine network confidentiality, integrity, and availability, potentially disrupting business operations and exposing sensitive information. Given the router's role as a gateway device, the vulnerability could serve as a foothold for attackers to infiltrate corporate or home networks. The availability of a public exploit increases the risk of widespread attacks, including automated scanning and exploitation campaigns. Organizations relying on these devices without proper segmentation or monitoring are at heightened risk of compromise.
Mitigation Recommendations
To mitigate CVE-2026-5045, organizations should immediately check for and apply any official firmware updates or patches released by Tenda addressing this vulnerability. If no patch is available, network administrators should restrict access to the router's management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted networks only. Disabling remote management features or changing default credentials can reduce attack surface. Monitoring network traffic for unusual activity and deploying intrusion detection/prevention systems (IDS/IPS) capable of detecting exploitation attempts targeting this vulnerability is recommended. Additionally, organizations should consider replacing affected devices with models from vendors with more robust security track records if timely patches are unavailable. Regular security audits and vulnerability scanning of network devices can help identify and remediate similar risks proactively. Finally, educating users about the risks of exposed network devices and enforcing strong network security policies will further reduce exploitation likelihood.
Affected Countries
China, India, Russia, Brazil, Indonesia, Vietnam, Thailand, Egypt, South Africa, Mexico
CVE-2026-5045: Stack-based Buffer Overflow in Tenda FH1201
Description
CVE-2026-5045 is a high-severity stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1. 2. 0. 14(408). It affects the WrlclientSet function in the /goform/WrlclientSet parameter handler component. The vulnerability arises from improper handling of the GO argument, allowing remote attackers to trigger a stack-based buffer overflow without authentication or user interaction. Exploitation can lead to full compromise of the device, including potential remote code execution. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of attack. This vulnerability poses significant risks to organizations using Tenda FH1201 routers, especially in environments with exposed management interfaces. Immediate patching or mitigation is critical to prevent exploitation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5045 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14(408). The flaw exists in the WrlclientSet function within the /goform/WrlclientSet endpoint, part of the parameter handler component responsible for processing configuration inputs. Specifically, the vulnerability is triggered by manipulating the GO argument, which is improperly validated, leading to a stack-based buffer overflow condition. This type of vulnerability allows an attacker to overwrite the call stack, potentially enabling arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score is 8.7 (high severity), reflecting the ease of exploitation (network vector, low attack complexity), no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, a public exploit is available, increasing the likelihood of active exploitation attempts. The affected product, Tenda FH1201, is a consumer and small office/home office (SOHO) router, commonly used in various countries, which broadens the attack surface. The vulnerability's exploitation could allow attackers to gain control over the device, intercept or manipulate network traffic, or pivot into internal networks.
Potential Impact
The impact of CVE-2026-5045 is significant for organizations using Tenda FH1201 routers, particularly those with exposed management interfaces accessible from untrusted networks. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the device. This can result in interception of sensitive data, network traffic manipulation, creation of persistent backdoors, or launching further attacks against internal network resources. The compromise of such routers can undermine network confidentiality, integrity, and availability, potentially disrupting business operations and exposing sensitive information. Given the router's role as a gateway device, the vulnerability could serve as a foothold for attackers to infiltrate corporate or home networks. The availability of a public exploit increases the risk of widespread attacks, including automated scanning and exploitation campaigns. Organizations relying on these devices without proper segmentation or monitoring are at heightened risk of compromise.
Mitigation Recommendations
To mitigate CVE-2026-5045, organizations should immediately check for and apply any official firmware updates or patches released by Tenda addressing this vulnerability. If no patch is available, network administrators should restrict access to the router's management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted networks only. Disabling remote management features or changing default credentials can reduce attack surface. Monitoring network traffic for unusual activity and deploying intrusion detection/prevention systems (IDS/IPS) capable of detecting exploitation attempts targeting this vulnerability is recommended. Additionally, organizations should consider replacing affected devices with models from vendors with more robust security track records if timely patches are unavailable. Regular security audits and vulnerability scanning of network devices can help identify and remediate similar risks proactively. Finally, educating users about the risks of exposed network devices and enforcing strong network security policies will further reduce exploitation likelihood.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-27T16:38:40.454Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c92cf6919ccadcdf22c137
Added to database: 3/29/2026, 1:45:26 PM
Last enriched: 3/29/2026, 2:00:32 PM
Last updated: 3/29/2026, 3:35:52 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.