Tenda F456 Router Faces High-Severity Stack Buffer Overflow
The National Vulnerability Database (NVD) recently disclosed CVE-2026-6200, a high-severity vulnerability impacting the Tenda F456 router, specifically version 1.0.0.5. This isn’t just a theoretical flaw; it’s a stack-based buffer overflow stemming from improper handling of the menufacturer/Go argument within the formwebtypelibrary function of the /goform/webtypelibrary file. The NVD assigned it a CVSS score of 8.8 (HIGH), which should immediately grab your attention.
What makes this particularly nasty is the attack vector: it’s remotely exploitable. An attacker doesn’t need physical access to the device or even to be on the local network. They can trigger this overflow across the wire. Even worse, the NVD notes that the exploit has been publicly disclosed, meaning it’s likely already in the wild or easily weaponized by threat actors looking for low-hanging fruit. This isn’t a zero-day that’s still under wraps; it’s a known quantity.
From a technical perspective, this falls under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow). These are classic memory corruption issues that often lead to arbitrary code execution. Given the remote exploitability and public disclosure, any unpatched Tenda F456 routers are sitting ducks for compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6200
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6200 | Buffer Overflow | Tenda F456 version 1.0.0.5 |
| CVE-2026-6200 | Buffer Overflow | CWE-121: Stack-based Buffer Overflow |
| CVE-2026-6200 | Buffer Overflow | Vulnerable function: formwebtypelibrary in /goform/webtypelibrary |
| CVE-2026-6200 | Buffer Overflow | Manipulation of argument 'menufacturer/Go' |