Description
A vulnerability was found in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used.
Published: 2026-04-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A vulnerability was identified in the Tenda F451 router firmware 1.0.0.7_cn_svn7958, specifically in the fromGstDhcpSetSer function of the httpd component. The function fails to properly validate the `dips` argument, allowing a crafted HTTP request to the /goform/GstDhcpSetSer endpoint to overflow a buffer. This flaw could lead to memory corruption. While the CVE description does not explicitly state the resulting effect, publicly available exploit information demonstrates that the overflow can be triggered remotely through HTTP requests, confirming that the vulnerability is exploitable over the network.

Affected Systems

Tenda F451 routers running firmware 1.0.0.7_cn_svn7958 are impacted. The vulnerability exists only in this specific build exposed at /goform/GstDhcpSetSer and there is no evidence of other affected versions.

Risk and Exploitability

The CVSS score of 8.7 reflects a high severity, while no EPSS score is provided, leaving the current exploitation likelihood unclear. Nevertheless, the flaw is accessed via remote HTTP requests and a public exploit is available, indicating that attackers can reach the target over the network. The vulnerability is not listed in CISA’s KEV catalog, but the public exploit makes the threat real, and immediate mitigation is advised.

Generated by OpenCVE AI on April 20, 2026 at 11:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device to the latest firmware release from Tenda that contains the buffer‑overflow fix.
  • If an update is not yet available, block access to the /goform/GstDhcpSetSer endpoint with a firewall or router ACL to prevent malicious POST requests.
  • Enforce strict input validation on DHCP configuration interfaces to ensure the dips parameter length is bounded and cannot overflow memory.

Generated by OpenCVE AI on April 20, 2026 at 11:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f451
Vendors & Products Tenda f451

Mon, 20 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used.
Title Tenda F451 httpd GstDhcpSetSer fromGstDhcpSetSer buffer overflow
First Time appeared Tenda
Tenda f451 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f451_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f451 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F451 F451 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T13:27:03.711Z

Reserved: 2026-04-19T17:05:40.608Z

Link: CVE-2026-6630

cve-icon Vulnrichment

Updated: 2026-04-20T13:26:59.977Z

cve-icon NVD

Status : Received

Published: 2026-04-20T11:16:19.407

Modified: 2026-04-20T11:16:19.407

Link: CVE-2026-6630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T12:00:05Z

Weaknesses