Tenda F451 Router Hit by Remote Buffer Overflow
The National Vulnerability Database (NVD) has flagged a critical stack-based buffer overflow, CVE-2026-6123, impacting the Tenda F451 router, specifically version 1.0.0.7. This vulnerability, stemming from the fromAddressNat function within the /goform/addressNat file’s httpd component, allows for remote exploitation.
Attackers can trigger the buffer overflow by manipulating the entrys argument, potentially leading to arbitrary code execution or denial of service. With a CVSS score of 8.8 (HIGH), the severity is undeniable. The NVD further notes that an exploit for this vulnerability has been publicly disclosed, significantly increasing the immediate risk for affected devices. This isn’t just a theoretical flaw; it’s actively weaponized code out in the wild.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6123
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6123 | Buffer Overflow | Tenda F451 version 1.0.0.7 |
| CVE-2026-6123 | Buffer Overflow | Vulnerable component: httpd |
| CVE-2026-6123 | Buffer Overflow | Vulnerable file: /goform/addressNat |
| CVE-2026-6123 | Buffer Overflow | Vulnerable function: fromAddressNat |
| CVE-2026-6123 | Buffer Overflow | Manipulation of argument 'entrys' leads to stack-based buffer overflow |