Tenda F451 Router Hit with Critical Buffer Overflow

Tenda F451 Router Hit with Critical Buffer Overflow

The National Vulnerability Database (NVD) has issued an advisory for CVE-2026-6121, highlighting a critical stack-based buffer overflow in the Tenda F451 router, specifically version 1.0.0.7. This vulnerability, boasting a CVSS score of 8.8 (HIGH), resides within the WrlclientSet function of the /goform/WrlclientSet component, which is part of the router’s httpd service.

The flaw is triggered by manipulating the GO argument, leading to a classic buffer overflow scenario. What makes this particularly nasty is the remote attack vector; an unauthenticated attacker could potentially exploit this without direct physical access. The NVD notes that an exploit has already been published, meaning this isn’t just theoretical — it’s actively weaponizable. This type of vulnerability often leads to remote code execution, giving an attacker full control over the affected device.

For those running these devices, this is a serious red flag. Buffer overflows, particularly in network devices like routers, are prime targets for initial access by threat actors. Once a router is compromised, it can be used for anything from network reconnaissance and data exfiltration to establishing persistent backdoors or launching further attacks within a network.

Related ATT&CK Techniques

🛡️ Detection Rules

4 rules · 5 SIEM formats

4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-6121

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6121 Buffer Overflow Tenda F451 version 1.0.0.7
CVE-2026-6121 Buffer Overflow Vulnerable function: WrlclientSet
CVE-2026-6121 Buffer Overflow Vulnerable file: /goform/WrlclientSet
CVE-2026-6121 Buffer Overflow Vulnerable component: httpd
CVE-2026-6121 Buffer Overflow Manipulation of argument GO causes stack-based buffer overflow

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs