Description
A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument wanmode/PPPOEPassword results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.
Published: 2026-04-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the fromAdvSetWan function of Tenda F451 firmware, triggered by manipulated wanmode or PPPOEPassword parameters sent to the /goform/AdvSetWan endpoint. The flaw belongs to CWE‑119 and CWE‑121 weaknesses, allowing an attacker to corrupt the stack and inject arbitrary code. Because the vulnerable interface is reachable over the network, exploitation can be performed from an external host without local access, enabling control over the device and its internal network resources.

Affected Systems

The vulnerability affects Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. Only this specific firmware release is known to contain the vulnerability; newer releases may have addressed it.

Risk and Exploitability

The severity of the flaw is reflected in a CVSS score of 8.7, denoting high risk. Exploitation is feasible remotely, and public exploits are available, indicating that attackers could gain unrestricted control of the device. EPSS data is not available, and the issue is not listed in the CISA KEV catalog, but the combination of remote attack vector, high CVSS, and public exploit suggests a substantial threat to confidentiality, integrity, and availability.

Generated by OpenCVE AI on April 13, 2026 at 01:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Tenda firmware update that removes the stack-based buffer overflow in the AdvSetWan handler.
  • If an update is not yet available, block or restrict access to the /goform/AdvSetWan endpoint using firewall rules or network segmentation.
  • Disable WAN mode changes through the web interface or enforce strong authentication for management access.
  • Monitor router logs for suspicious requests to the AdvSetWan endpoint to detect potential exploitation attempts.

Generated by OpenCVE AI on April 13, 2026 at 01:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f451:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f451_firmware:1.0.0.7:*:*:*:*:*:*:*

Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f451
Vendors & Products Tenda f451

Mon, 13 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument wanmode/PPPOEPassword results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.
Title Tenda F451 AdvSetWan fromAdvSetWan stack-based overflow
First Time appeared Tenda
Tenda f451 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F451 F451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T17:52:04.265Z

Reserved: 2026-04-12T07:23:00.812Z

Link: CVE-2026-6137

cve-icon Vulnrichment

Updated: 2026-04-13T17:51:58.675Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-13T00:16:21.300

Modified: 2026-04-30T12:35:12.503

Link: CVE-2026-6137

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:50Z

Weaknesses