Tenda Router Vulnerability Exposes Networks to Remote Attacks
The National Vulnerability Database has flagged a critical vulnerability, CVE-2026-6197, affecting Tenda F456 routers running firmware version 1.0.0.5. According to the NVD, a flaw exists within the formWrlsafeset function, located in the /goform/AdvSetWrlsafeset file. By manipulating the mit_ssid argument, remote attackers can trigger a stack-based buffer overflow.
This type of vulnerability is particularly nasty because it allows an attacker to overwrite memory regions, potentially leading to arbitrary code execution or denial-of-service conditions. The fact that it’s remotely exploitable and doesn’t require special privileges (indicated by the CVSS vector’s PR:L - Low Privileges) makes it a prime target for widespread exploitation.
The National Vulnerability Database notes that exploit code for this vulnerability has already been published, meaning attackers could be actively weaponizing it. Given the high CVSS score of 8.8, organizations relying on Tenda F456 routers should consider this a significant risk.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6197
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6197 | Vulnerability | CVE-2026-6197 |