High-Severity Buffer Overflow Hits Tenda F451 Routers
The National Vulnerability Database (NVD) has issued an alert for CVE-2026-6136, a high-severity stack-based buffer overflow impacting Tenda F451 routers, specifically version 1.0.0.7_cn_svn7958. This isn’t some theoretical flaw; the NVD confirms a public exploit disclosure, meaning attackers could already be leveraging this. The vulnerability lies within the frmL7ImForm function of the /goform/L7Im file, where manipulating the page argument triggers the overflow.
Rated with a CVSSv3.1 score of 8.8 (HIGH), this vulnerability is remotely exploitable, requiring only low privileges (PR:L) and no user interaction (UI:N). This makes it a prime target for threat actors looking to gain a foothold on networks. The NVD attributes the flaw to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow), classic memory corruption issues that often lead to arbitrary code execution. Given the widespread use of SOHO routers, this is a significant finding that demands attention.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6136
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6136 | Buffer Overflow | Tenda F451 version 1.0.0.7_cn_svn7958 |
| CVE-2026-6136 | Buffer Overflow | CWE-121: Stack-based Buffer Overflow |
| CVE-2026-6136 | Buffer Overflow | Vulnerable function: frmL7ImForm in /goform/L7Im |
| CVE-2026-6136 | Buffer Overflow | Vulnerable argument: page |