Description
A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-07
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability reveals a stack-based buffer overflow in the Tenda FH451 firmware, triggered by manipulating the wanmode/PPPOEPassword parameter in the /goform/AdvSetWan endpoint. This flaw allows attackers to overflow the stack and potentially execute arbitrary code, thereby compromising the device’s confidentiality, integrity, and availability. The vulnerability is a classic example of the buffer overflow weakness identified by CWE-119 and CWE-121.

Affected Systems

The affected system is the Tenda FH451 router running firmware 1.0.0.9. The stack overflow occurs in the sub_3C434 function within the AdvSetWan handler that processes WAN configuration requests.

Risk and Exploitability

The flaw receives a CVSS score of 8.7, indicating high severity, but its EPSS score is less than 1%, reflecting a low probability of exploitation in the wild. Because the exploit is publicly available and the vulnerability can be triggered remotely over the network, the risk to an exposed device remains significant. Although the vulnerability is not listed in the CISA KEV catalog, organizations should treat it as critical and apply mitigations promptly.

Generated by OpenCVE AI on April 16, 2026 at 10:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware version from Tenda that resolves the stack-based overflow in the AdvSetWan handler.
  • Limit access to the router’s web administration interface to trusted internal IP ranges or VPN connections to reduce the attack surface.
  • Configure the router’s firewall or the external network gateway to block or restrict requests to the /goform/AdvSetWan endpoint from untrusted sources.
  • Regularly review router logs for unusual access attempts to the AdvSetWan endpoint and set up alerts for potential exploitation attempts.

Generated by OpenCVE AI on April 16, 2026 at 10:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:fh451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:fh451_firmware:1.0.0.9:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda fh451
Vendors & Products Tenda fh451

Sat, 07 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda FH451 AdvSetWan sub_3C434 stack-based overflow
First Time appeared Tenda
Tenda fh451 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:fh451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda fh451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Fh451 Fh451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:28:08.366Z

Reserved: 2026-03-06T21:22:04.174Z

Link: CVE-2026-3678

cve-icon Vulnrichment

Updated: 2026-03-11T16:25:46.518Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T23:15:46.520

Modified: 2026-03-09T16:16:21.987

Link: CVE-2026-3678

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:45:26Z

Weaknesses