Description
A security flaw has been discovered in Tenda F451 1.0.0.7_cn_svn7958. This vulnerability affects the function fromqossetting of the file /goform/qossetting. Performing a manipulation of the argument qos results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow occurs in the fromqossetting function of the /goform/qossetting endpoint on Tenda F451 routers. By manipulating the qos parameter, an attacker can trigger the vulnerability remotely and potentially execute arbitrary code, compromising confidentiality, integrity, and availability of the device and the network it manages. The flaw falls under CWE-119 and CWE-121, indicating classic buffer overflow weaknesses.

Affected Systems

The vulnerability affects the Tenda F451 router running firmware version 1.0.0.7_cn_svn7958. Users running this firmware should identify whether their devices are on the affected version and note that no other versions are listed as impacted in the available data.

Risk and Exploitability

The CVSS score of 8.7 reflects high severity. The EPSS score is not publicly available, yet a public exploit has been released, and the attack vector is remote, implying unauthenticated exploitation is possible via crafted HTTP requests. The vulnerability is not listed in CISA's KEV catalog, but the existence of an available exploit suggests a realistic risk of actual attacks.

Generated by OpenCVE AI on April 13, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for the Tenda F451 router from the vendor’s website.
  • If no update is available, block remote access to the /goform/qossetting endpoint with firewall rules or router configuration settings.
  • Disable QoS functionality on the router if not required for network operations.
  • Change the default administrator password to a strong, unique password and enable secure authentication methods if supported.
  • Monitor network traffic for suspicious requests targeting /goform/qossetting.

Generated by OpenCVE AI on April 13, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f451_firmware:1.0.0.7:*:*:*:*:*:*:*

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f451
Vendors & Products Tenda f451

Sun, 12 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda F451 1.0.0.7_cn_svn7958. This vulnerability affects the function fromqossetting of the file /goform/qossetting. Performing a manipulation of the argument qos results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Title Tenda F451 qossetting fromqossetting stack-based overflow
First Time appeared Tenda
Tenda f451 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F451 F451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-15T15:26:53.883Z

Reserved: 2026-04-12T07:22:29.434Z

Link: CVE-2026-6134

cve-icon Vulnrichment

Updated: 2026-04-15T15:26:48.227Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-12T23:16:26.320

Modified: 2026-04-30T12:37:36.407

Link: CVE-2026-6134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:54Z

Weaknesses