Tenda F451 Router Hit by Remote Buffer Overflow
The National Vulnerability Database (NVD) has flagged a critical security flaw, CVE-2026-6134, impacting the Tenda F451 router, specifically version 1.0.0.7_cn_svn7958. This isn’t just a theoretical bug; it’s a stack-based buffer overflow stemming from improper handling of the qos argument within the fromqossetting function of the /goform/qossetting file.
What makes this particularly nasty is its remote exploitability. An attacker doesn’t need physical access or even to be on the local network. They can trigger this overflow remotely, potentially leading to arbitrary code execution or a denial of service. With a CVSS score of 8.8 (HIGH), this vulnerability is a serious concern, especially since, according to the NVD, an exploit has already been released to the public. This means it’s not a matter of ‘if’ but ‘when’ it gets weaponized in the wild.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 5 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6134
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6134 | Buffer Overflow | Tenda F451 version 1.0.0.7_cn_svn7958 |
| CVE-2026-6134 | Buffer Overflow | CWE-121 Stack-based Buffer Overflow |
| CVE-2026-6134 | Buffer Overflow | Vulnerable function: fromqossetting in /goform/qossetting |
| CVE-2026-6134 | Buffer Overflow | Vulnerable argument: qos |