Description
A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects some unknown processing of the file /goform/GstDhcpSetSer. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the Tenda FH451 router when processing requests to the /goform/GstDhcpSetSer endpoint. The flaw allows an attacker to supply data that exceeds the intended buffer size, potentially overwriting control data on the stack and enabling arbitrary code execution or device compromise. The underlying weakness corresponds to CWE‑119 (improper memory handling) and CWE‑120 (unsafe stack manipulation).

Affected Systems

The vulnerability impacts Tenda FH451 routers running firmware versions up to 1.0.0.9, inclusive. Users of earlier firmware revisions may also be vulnerable if the affected code is present. The fault occurs in the router's web‑based administration interface, which provides DHCP configuration through the referenced endpoint.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity level, while the EPSS score of less than 1% reflects a low probability of exploitation at this time. The flaw can be triggered remotely by sending a crafted request to the exposed web interface; based on the description, it is inferred that authentication may not be required, but this is not explicitly stated. Although the vulnerability is not listed in the CISA KEV catalog, the combination of remote attack surface and potential for full device takeover makes it a priority for remediation.

Generated by OpenCVE AI on April 18, 2026 at 11:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy a firmware patch that addresses the buffer overflow on the Tenda FH451, ensuring the device is updated to a version that removes the vulnerable code.
  • Limit access to the router’s web interface by restricting incoming traffic to trusted IP ranges or by placing the device behind a network firewall with strict ingress rules.
  • If a firmware update is unavailable, block or disable the /goform/GstDhcpSetSer endpoint by applying access-control lists or by isolating the DHCP configuration through alternative methods provided by the manufacturer.

Generated by OpenCVE AI on April 18, 2026 at 11:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh451 Firmware
CPEs cpe:2.3:h:tenda:fh451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh451_firmware:1.0.0.9:*:*:*:*:*:*:*
Vendors & Products Tenda fh451 Firmware

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda fh451
Vendors & Products Tenda
Tenda fh451

Sun, 22 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects some unknown processing of the file /goform/GstDhcpSetSer. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title Tenda FH451 GstDhcpSetSer buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh451 Fh451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:16:47.962Z

Reserved: 2026-02-20T20:16:11.075Z

Link: CVE-2026-2911

cve-icon Vulnrichment

Updated: 2026-02-23T19:16:41.140Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T04:15:59.383

Modified: 2026-02-23T20:21:22.323

Link: CVE-2026-2911

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses