Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-6120 β€” AI Deep Analysis Summary

CVSS 8.8 Β· High

Q1What is this vulnerability? (Essence + Consequences)

- **CVE-2026-6120**: Stack-based overflow in `httpd` of **Tenda F451** 🚨 - Happens in `DhcpListClient` β†’ `fromDhcpListClient` - **Consequence**: Full control risk πŸ’₯ - Remote code exec possible - Device compro…

Q2Root Cause? (CWE/Flaw)

- **Root Cause**: Stack-based buffer overflow ⚠️ - Likely **CWE-121**: Stack buffer overflow - Triggered by crafted input in DHCP client handling πŸ”

Q3Who is affected? (Versions/Components)

- **Affected Product**: **Tenda F451** router πŸ“Ά - Component: `httpd` service - Firmware: `F451_kfw_V1.0.0.7_cn_svn7958 V1.0.0.7` 🧩 - Others unconfirmed ❓

Q4What can hackers do? (Privileges/Data)

- **Hackers can**: - Gain **high impact** 🚨 - **Privilege**: Auth user (PR:L) β†’ full control - Access, modify, delete **data** πŸ’Ύ - Execute arbitrary code πŸ–₯️

Q5Is exploitation threshold high? (Auth/Config)

- **Exploitation threshold**: LOW βœ… - **Attack Vector**: Network (AV:N) - **Attack Complexity**: Low (AC:L) - **Privileges Required**: Low (PR:L) - **No User Interaction** (UI:N) 🎯

Q6Is there a public Exp? (PoC/Wild Exploitation)

- **Public Exploit**: YES 🚨 - Ref: `https://github.com/Jimi-Lab/cve/issues/11` πŸ”— - Tagged: `exploit`, `issue-tracking` - No PoC listed in `pocs` field but GitHub shows activity πŸ§ͺ

Q7How to self-check? (Features/Scanning)

- **Self-check**: - Check firmware = `V1.0.0.7` πŸ” - Monitor `httpd` crashes/log anomalies 🧠 - Scan w/ signature from `VDB-356983/cti` πŸ›‘οΈ - Look for DHCP list parsing issues πŸ“‹

Q8Is it fixed officially? (Patch/Mitigation)

- **Official Fix**: NOT mentioned 🚫 - No patch info in refs/tags - Advisory exists, but no fix link πŸ“­ - Status: **Unpatched** ❌

Q9What if no patch? (Workaround)

- **Workaround if no patch**: - Restrict access to `httpd` port 🚷 - Disable unused DHCP features πŸ›‘ - Apply firewall rules at network edge 🧱 - Monitor & alert on abnormal DHCP requests πŸ””

Q10Is it urgent? (Priority Suggestion)

- **Urgency**: HIGH πŸ”₯ - CVSS: `9.0` range (H/H/H) πŸ’₯ - Public exploit + remote + no patch = 🚨 - **Priority**: Patch ASAP or isolate device πŸ›‘οΈβ°