Description
A vulnerability was detected in Tenda F451 1.0.0.7. Affected is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
Published: 2026-04-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Stack‑Based Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the fromDhcpListClient function of the httpd component on Tenda F451 routers running firmware 1.0.0.7. By sending a specially crafted page parameter to the /goform/DhcpListClient endpoint, an attacker can corrupt the stack and may be able to execute arbitrary code on the device. The flaw is identified by CWE‑119 and CWE‑121.

Affected Systems

The vulnerability targets Tenda F451 routers with firmware version 1.0.0.7. The affected component is the HTTP server’s DhcpListClient handler exposed through the web management interface.

Risk and Exploitability

The CVSS base score of 8.7 classifies the issue as high severity. The EPSS score is unavailable and the vulnerability is not listed in CISA’s KEV catalog, yet a public exploit has been disclosed. The attack can be launched remotely via the web interface, which could potentially lead to code execution on the device and compromise the device or its network.

Generated by OpenCVE AI on April 12, 2026 at 08:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that patches the DhcpListClient buffer overflow.
  • If a firmware update is not yet available, disable remote web management or restrict access to the HTTP interface using firewall rules or network segmentation.
  • After applying the update or restriction, monitor the device for abnormal activity such as unexpected processes or outbound connections.
  • Verify the authenticity of any firmware before installation by checking vendor‑provided checksums or signatures.

Generated by OpenCVE AI on April 12, 2026 at 08:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f451_firmware:1.0.0.7:*:*:*:*:*:*:*

Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f451
Vendors & Products Tenda f451

Sun, 12 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda F451 1.0.0.7. Affected is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
Title Tenda F451 httpd DhcpListClient fromDhcpListClient stack-based overflow
First Time appeared Tenda
Tenda f451 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F451 F451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T17:51:13.291Z

Reserved: 2026-04-11T16:03:22.604Z

Link: CVE-2026-6120

cve-icon Vulnrichment

Updated: 2026-04-13T17:51:09.364Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-12T06:16:22.187

Modified: 2026-04-29T20:02:56.990

Link: CVE-2026-6120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:12Z

Weaknesses