Tenda F456 Router Hit by Critical Stack-Based Buffer Overflow
The National Vulnerability Database (NVD) has disclosed CVE-2026-6199, a high-severity vulnerability impacting the Tenda F456 router, specifically version 1.0.0.5. This isn’t just a theoretical issue; it’s a stack-based buffer overflow within the fromqossetting function, found in the /goform/qossetting file. The flaw can be triggered by manipulating the page argument.
What makes this particularly nasty is the remote exploitability and the fact that an exploit has already been made public. This means script kiddies and seasoned attackers alike could be leveraging this. A CVSSv3.1 score of 8.8 (HIGH) underscores the potential impact: full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H) with low attack complexity (AC:L) and no user interaction required (UI:N). It’s a classic case of CWE-119 and CWE-121, highlighting inadequate buffer handling.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6199
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6199 | Buffer Overflow | Tenda F456 version 1.0.0.5 |
| CVE-2026-6199 | Buffer Overflow | Vulnerable function: fromqossetting in /goform/qossetting |
| CVE-2026-6199 | Buffer Overflow | Vulnerable argument: page (stack-based buffer overflow) |