Description
A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the frmL7ImForm function located in /goform/L7Im of the Tenda F451 firmware. By manipulating the page parameter, an attacker can overflow the buffer on the stack and potentially execute arbitrary code. The vulnerability is remotely exploitable through the web interface, and public exploits have been disclosed. The high CVSS score of 8.7 reflects the severity of remote code execution risk.

Affected Systems

Devices affected are Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. The vulnerability is tied specifically to the frmL7ImForm handler on the web interface of that firmware build.

Risk and Exploitability

The CVSS base score of 8.7 indicates high criticality, while the EPSS score is unavailable and the vulnerability is not listed in CISA's KEV catalog. The attack vector is remote, exploiting a web interface; no network or local privilege prerequisites are required, making it readily exploitable from any internet-connected device that can reach the router's management interface. Without timely patching, an attacker could gain full control of the device.

Generated by OpenCVE AI on April 13, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for Tenda F451 if available.
  • Restrict or block access to the /goform/L7Im endpoint from untrusted networks.
  • Disable remote administration features or limit access to trusted IPs.
  • Monitor device logs for unusual activity.

Generated by OpenCVE AI on April 13, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f451_firmware:1.0.0.7:*:*:*:*:*:*:*

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f451
Vendors & Products Tenda f451

Sun, 12 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Title Tenda F451 L7Im frmL7ImForm stack-based overflow
First Time appeared Tenda
Tenda f451 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F451 F451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T16:32:54.668Z

Reserved: 2026-04-12T07:22:47.230Z

Link: CVE-2026-6136

cve-icon Vulnrichment

Updated: 2026-04-14T15:19:37.529Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-13T00:16:21.097

Modified: 2026-04-30T12:36:12.937

Link: CVE-2026-6136

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:51Z

Weaknesses