Critical Vulnerability Found in Tenda Routers – Update Your Firmware Now

CVSScvssV3_1: 8.8

A critical remote code execution vulnerability was discovered in Tenda PA6 routers running firmware version The vulnerability exists in the httpd component’s portmap file due to a lack of proper validation of user-supplied input to the cgiPortMapAdd function.

By manipulating the “groupName” parameter, an attacker could exploit this to cause a stack-based buffer overflow. This would allow the execution of arbitrary code on the affected device with root privileges. Proof-of-concept exploit code has also been released publicly.

Routers are often overlooked when it comes to security updates but play an important role in our home networks. If exploited, this vulnerability could allow a remote attacker to complete take over your router and do things like intercept network traffic, change device settings, or use it to launch attacks against other systems on your network.

The best way to protect yourself is to update your Tenda PA6 router to the latest firmware version available. You should also consider changing the default administrative password to something more secure. Keeping your router’s software up-to-date is one of the most effective ways to defend against newly discovered vulnerabilities. Act now to patch this critical remote code execution flaw in Tenda routers.