Tenda Router Faces Critical Stack Buffer Overflow
The National Vulnerability Database (NVD) has highlighted a significant vulnerability, CVE-2026-6133, impacting the Tenda F451 router, specifically version 1.0.0.7_cn_svn7958. This critical flaw, a stack-based buffer overflow, stems from improper handling within the fromSafeUrlFilter function of the /goform/SafeUrlFilter file. Manipulating the page argument can lead to remote code execution, a red flag for any network device.
With a CVSSv3.1 score of 8.8 (HIGH), this isn’t just a theoretical exploit; the NVD notes that a public exploit is already available. This drastically increases the risk, as adversaries don’t need to be zero-day hunters to leverage it. The vulnerability is categorized under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow), classic attack vectors that continue to plague embedded systems.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6133
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6133 | Buffer Overflow | Tenda F451 version 1.0.0.7_cn_svn7958 |
| CVE-2026-6133 | Buffer Overflow | Vulnerable function: fromSafeUrlFilter in /goform/SafeUrlFilter |
| CVE-2026-6133 | Buffer Overflow | Vulnerable argument: 'page' in fromSafeUrlFilter |
| CVE-2026-6133 | Buffer Overflow | CWE-121: Stack-based Buffer Overflow |