Description
A weakness has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the fromSetIpBind function of the /goform/SetIpBind page on Tenda F451 routers. By sending a crafted "page" argument from a remote location, an attacker can trigger a buffer overflow that may lead to arbitrary code execution. The vulnerability is classified under CWE‑119 (Buffer Overflow) and CWE‑121 (Stack Smashing). The exploit is publicly available and can be performed over the network without physical access.

Affected Systems

Vulnerable equipment is the Tenda F451 router running firmware 1.0.0.7_cn_svn7958. No other product versions are listed, and the issue is specific to this firmware build.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, and although the EPSS score is not available, the public availability of the exploit and the ability to initiate the attack remotely make the risk significant. The vulnerability is not listed in CISA’s KEV catalog, but its remote nature and high CVSS warrant urgent attention. Exploitation requires only sending a malicious request to the router’s web interface; no special credentials are required, making the attack path comparatively straightforward.

Generated by OpenCVE AI on April 13, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and flash the latest firmware version from Tenda’s official website that addresses the stack overflow flaw.
  • If an updated firmware is not yet available, block or restrict external access to the /goform/SetIpBind endpoint using firewall rules or web‑application firewalls.
  • Disable remote web management on the router or limit it to trusted internal IP addresses until a patch is applied.
  • Monitor router logs for abnormal requests to /goform/SetIpBind and investigate any suspicious activity promptly.
  • Contact Tenda support for guidance on temporary mitigations if the above measures are insufficient.

Generated by OpenCVE AI on April 13, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f451_firmware:1.0.0.7:*:*:*:*:*:*:*

Mon, 13 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f451
Vendors & Products Tenda f451

Sun, 12 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Title Tenda F451 SetIpBind fromSetIpBind stack-based overflow
First Time appeared Tenda
Tenda f451 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F451 F451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T15:21:51.683Z

Reserved: 2026-04-12T07:22:43.463Z

Link: CVE-2026-6135

cve-icon Vulnrichment

Updated: 2026-04-13T15:21:48.147Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-13T00:16:20.880

Modified: 2026-04-30T12:36:52.803

Link: CVE-2026-6135

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:53Z

Weaknesses