Description
A vulnerability was found in Tenda F451 1.0.0.7. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Performing a manipulation of the argument entrys results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Published: 2026-04-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

The reported issue is a stack-based buffer overflow triggered by the fromAddressNat function in the HTTP daemon of the Tenda F451 router. When an attacker supplies an overly long entry string to the /goform/addressNat endpoint, the input is copied into a fixed-size buffer without bounds checking, corrupting the call stack. This flaw can be exploited from a remote host to achieve arbitrary code execution, compromising the confidentiality, integrity, and availability of the device and any networks it serves.

Affected Systems

Only the Tenda F451 router, specifically firmware version 1.0.0.7, is affected. The vulnerability resides in the httpd component handling the addressNat configuration page. No other firmware revisions or models are listed as impacted.

Risk and Exploitability

The CVSS base score of 8.7 classifies the flaw as high severity. Although an exploit prediction score is not available and the vulnerability is not listed in CISA's KEV catalog, publicly released proof‑of‑concept code exists, indicating that the attack has been demonstrated in the wild. Remote attackers can trigger the overflow over the network by crafting HTTP requests, making the risk significant for any exposed router.

Generated by OpenCVE AI on April 12, 2026 at 09:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by Tenda for the F451 router if available.
  • If no update is available, restrict external access to the router’s administration interface by configuring network‑level firewalls or VPNs to limit traffic to known management IP addresses.
  • Disable the addressNat feature or block the /goform/addressNat endpoint if the router firmware allows configuration changes.
  • Monitor the router’s access logs for anomalous activity and apply a security policy to detect repeated failed or malformed requests.

Generated by OpenCVE AI on April 12, 2026 at 09:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f451_firmware:1.0.0.7:*:*:*:*:*:*:*

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f451
Vendors & Products Tenda f451

Sun, 12 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda F451 1.0.0.7. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Performing a manipulation of the argument entrys results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Title Tenda F451 httpd addressNat fromAddressNat stack-based overflow
First Time appeared Tenda
Tenda f451 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F451 F451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T20:51:33.016Z

Reserved: 2026-04-11T16:03:48.195Z

Link: CVE-2026-6123

cve-icon Vulnrichment

Updated: 2026-04-13T20:51:29.812Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-12T09:16:17.060

Modified: 2026-04-29T20:00:54.070

Link: CVE-2026-6123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:08Z

Weaknesses