Tenda F451 Router Stack Overflow: Public Exploit Available

Tenda F451 Router Stack Overflow: Public Exploit Available

The National Vulnerability Database (NVD) has reported a critical vulnerability, CVE-2026-6137, impacting the Tenda F451 router, specifically version 1.0.0.7_cn_svn7958. This isn’t some theoretical flaw; it’s a stack-based buffer overflow within the fromAdvSetWan function of the /goform/AdvSetWan file. The entry point for this exploit is through manipulating the wanmode/PPPOEPassword argument.

What makes this particularly nasty is its remote exploitability and the fact that a public exploit is already out in the wild. This isn’t a zero-day that’s being quietly traded; it’s now widely accessible, meaning script kiddies and more sophisticated actors alike can leverage it. The NVD assigns it a CVSS score of 8.8 (HIGH), with a vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, underscoring the severity. It’s a network-attackable vulnerability requiring low privileges, with no user interaction, leading to high confidentiality, integrity, and availability impacts. This is a classic CWE-119 and CWE-121 scenario – a buffer overflow just waiting to be triggered.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 5 SIEM formats

3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-6137

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6137 Buffer Overflow Tenda F451 version 1.0.0.7_cn_svn7958
CVE-2026-6137 Buffer Overflow Vulnerable function: fromAdvSetWan in /goform/AdvSetWan
CVE-2026-6137 Buffer Overflow Vulnerable arguments: wanmode, PPPOEPassword
CVE-2026-6137 Buffer Overflow CWE-121: Stack-based Buffer Overflow

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs