Tenda F456 Routers Hit by Critical Buffer Overflow
A high-severity stack-based buffer overflow (CVE-2026-6198) has been identified in Tenda F456 routers, specifically affecting version 1.0.0.5. According to the National Vulnerability Database, this critical flaw resides within the fromNatStaticSetting function of the /goform/NatStaticSetting file. The vulnerability can be triggered by manipulating the page argument, leading to a remote attack vector.
With a CVSSv3.1 score of 8.8 (HIGH), this vulnerability poses a significant risk. The nature of the flaw — a stack-based buffer overflow — is a classic attack vector, often leading to remote code execution (RCE) if exploited successfully. Given that the exploit has been publicly disclosed, the window for threat actors to weaponize this is wide open. This isn’t just a theoretical vulnerability; it’s actively out there in the wild, waiting for an opportune moment.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 5 SIEM formats3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6198
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6198 | Vulnerability | CVE-2026-6198 |