Description
A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
Published: 2026-03-07
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow potentially enabling code execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the fromSetCfm function of the Tenda FH451 firmware 1.0.0.9, triggered by manipulating the funcname/funcpara1 arguments in the /goform/setcfm interface. The flaw permits a remote attacker to corrupt the stack, leading to uncontrolled behavior that could allow arbitrary code execution, thereby compromising device confidentiality, integrity, and availability. This vulnerability is classified as CWE-119 and CWE-121.

Affected Systems

The vulnerability affects Tenda FH451 routers running firmware version 1.0.0.9. No other versions have been confirmed to be impacted at this time.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, while the EPSS score of less than 1% suggests a low current likelihood of exploitation. The flaw can be triggered remotely via the web interface, but the exploit requires sending a crafted payload to the setcfm endpoint. The vulnerability is not listed in CISA’s KEV catalog.

Generated by OpenCVE AI on April 16, 2026 at 04:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a patched version that resolves the fromSetCfm overflow flaw.
  • Restrict network access to the device’s management interface using firewall rules or VLAN segmentation, limiting connections to trusted internal hosts.
  • If the setcfm endpoint is not required for normal operation, disable or block access to it to remove the attack surface.
  • Monitor the device for unusual activity and apply future vendor updates as they become available.

Generated by OpenCVE AI on April 16, 2026 at 04:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:fh451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh451_firmware:1.0.0.9:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh451
Vendors & Products Tenda fh451

Sat, 07 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
Title Tenda FH451 setcfm fromSetCfm stack-based overflow
First Time appeared Tenda
Tenda fh451 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh451 Fh451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:28:13.917Z

Reserved: 2026-03-06T21:22:00.791Z

Link: CVE-2026-3677

cve-icon Vulnrichment

Updated: 2026-03-11T16:25:48.510Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T22:15:50.770

Modified: 2026-03-09T16:16:11.300

Link: CVE-2026-3677

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:45:16Z

Weaknesses