Tenda F451 Router Hit by Remote Buffer Overflow
The National Vulnerability Database (NVD) has flagged a critical vulnerability, CVE-2026-6120, affecting the Tenda F451 router, specifically version 1.0.0.7. This bug resides within the fromDhcpListClient function of the /goform/DhcpListClient file, handled by the device’s httpd component.
According to the NVD, a crafted page argument can trigger a stack-based buffer overflow, allowing for remote exploitation. With a CVSS score of 8.8 (HIGH), this isn’t some minor bug; it’s a serious remote code execution vector. The NVD further notes that an exploit for this vulnerability is already public, meaning script kiddies and seasoned threat actors alike could be leveraging it right now. This is a classic CWE-119/CWE-121 scenario, underscoring the persistent danger of improper buffer handling in embedded systems.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 5 SIEM formats3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6120
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6120 | Buffer Overflow | Tenda F451 version 1.0.0.7 |
| CVE-2026-6120 | Buffer Overflow | Vulnerable component: httpd |
| CVE-2026-6120 | Buffer Overflow | Vulnerable file: /goform/DhcpListClient |
| CVE-2026-6120 | Buffer Overflow | Vulnerable function: fromDhcpListClient |
| CVE-2026-6120 | Buffer Overflow | Vulnerable argument: page (leading to stack-based buffer overflow) |