- **CVE-2026-6120**: Stack-based overflow in `httpd` of **Tenda F451** 🚨 - Happens in `DhcpListClient` → `fromDhcpListClient` - **Consequence**: Full control risk 💥 - Remote code exec possible - Device compro…
- **Public Exploit**: YES 🚨 - Ref: `https://github.com/Jimi-Lab/cve/issues/11` 🔗 - Tagged: `exploit`, `issue-tracking` - No PoC listed in `pocs` field but GitHub shows activity 🧪
Q7怎么自查?(特征/扫描)
- **Self-check**: - Check firmware = `V1.0.0.7` 🔍 - Monitor `httpd` crashes/log anomalies 🧠 - Scan w/ signature from `VDB-356983/cti` 🛡️ - Look for DHCP list parsing issues 📋
Q8官方修了吗?(补丁/缓解)
- **Official Fix**: NOT mentioned 🚫 - No patch info in refs/tags - Advisory exists, but no fix link 📭 - Status: **Unpatched** ❌
Q9没补丁咋办?(临时规避)
- **Workaround if no patch**: - Restrict access to `httpd` port 🚷 - Disable unused DHCP features 🛑 - Apply firewall rules at network edge 🧱 - Monitor & alert on abnormal DHCP requests 🔔
Q10急不急?(优先级建议)
- **Urgency**: HIGH 🔥 - CVSS: `9.0` range (H/H/H) 💥 - Public exploit + remote + no patch = 🚨 - **Priority**: Patch ASAP or isolate device 🛡️⏰