CVE-2026-6199: Stack-based Buffer Overflow in Tenda F456
A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
The Tenda F456 router firmware version 1.0.0.5 contains a stack-based buffer overflow vulnerability in the fromqossetting function of the /goform/qossetting endpoint. This vulnerability arises from improper handling of the 'page' argument, allowing an attacker to overflow the stack buffer remotely. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Exploit code has been made public, increasing the risk of potential attacks. No official patch or mitigation has been documented by the vendor at this time.
Potential Impact
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected device due to the stack-based buffer overflow. This could lead to device compromise, potentially affecting the confidentiality, integrity, and availability of the router and the network it serves. Given the high CVSS score and public availability of exploit code, the risk to affected devices is significant. However, there are no confirmed reports of active exploitation in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should consider limiting network exposure of the affected device, such as restricting remote access to the management interface. Monitor vendor communications for updates on patches or official mitigations. No vendor advisory or official fix information is currently available.
CVE-2026-6199: Stack-based Buffer Overflow in Tenda F456
Description
A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Tenda F456 router firmware version 1.0.0.5 contains a stack-based buffer overflow vulnerability in the fromqossetting function of the /goform/qossetting endpoint. This vulnerability arises from improper handling of the 'page' argument, allowing an attacker to overflow the stack buffer remotely. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Exploit code has been made public, increasing the risk of potential attacks. No official patch or mitigation has been documented by the vendor at this time.
Potential Impact
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected device due to the stack-based buffer overflow. This could lead to device compromise, potentially affecting the confidentiality, integrity, and availability of the router and the network it serves. Given the high CVSS score and public availability of exploit code, the risk to affected devices is significant. However, there are no confirmed reports of active exploitation in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should consider limiting network exposure of the affected device, such as restricting remote access to the management interface. Monitor vendor communications for updates on patches or official mitigations. No vendor advisory or official fix information is currently available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-04-13T08:48:15.082Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69dd3da482d89c981f3fccca
Added to database: 4/13/2026, 7:01:56 PM
Last enriched: 4/13/2026, 7:16:56 PM
Last updated: 4/13/2026, 8:04:48 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.