Tenda Router Vulnerability: Remote Exploitable Buffer Overflow

Tenda Router Vulnerability: Remote Exploitable Buffer Overflow

The National Vulnerability Database has identified CVE-2026-6630, a critical buffer overflow vulnerability in Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. This flaw resides within the httpd component, specifically in the /goform/GstDhcpSetSer file and the fromGstDhcpSetSer function. Attackers can exploit this by manipulating the ‘dips’ argument, triggering a buffer overflow that can be initiated remotely without requiring any user interaction or prior authentication.

With a CVSS score of 8.8 (HIGH), this vulnerability presents a significant risk. The National Vulnerability Database highlights that the exploit has been publicly disclosed, meaning threat actors can readily develop and deploy attacks against unpatched Tenda F451 devices. The potential impact includes remote code execution, allowing attackers to compromise the router and potentially use it as a pivot point into the network or to intercept traffic passing through it.

Defenders should immediately identify and secure all Tenda F451 routers within their infrastructure. Prioritize patching firmware to the latest available version or, if patching is not immediately feasible, implement network segmentation to isolate these devices and restrict remote access. Given the public exploit, assuming these devices are already targeted or compromised is a prudent security posture.

What This Means For You

  • If your organization utilizes Tenda F451 routers, you must verify the firmware version and patch immediately to address CVE-2026-6630. Given the remote exploitability and public availability, treat these devices as compromised until confirmed otherwise and audit network traffic for any signs of lateral movement or data exfiltration originating from them.

Related ATT&CK Techniques

🛡️ Detection Rules

1 rules · 6 SIEM formats

1 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-6630 Tenda Router HTTP Request Buffer Overflow

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6630 Buffer Overflow Tenda F451 version 1.0.0.7_cn_svn7958
CVE-2026-6630 Buffer Overflow Vulnerable function: fromGstDhcpSetSer
CVE-2026-6630 Buffer Overflow Vulnerable file: /goform/GstDhcpSetSer
CVE-2026-6630 Buffer Overflow Vulnerable component: httpd
CVE-2026-6630 Buffer Overflow Manipulation of argument 'dips'
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 20, 2026 at 14:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6636 — P2r3 Convert Path Traversal

CVE-2026-6636 — A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423612a5cf91de75b. Affected is the function Bun.serve of the file buildCache.js of the component API....

vulnerabilityCVEmedium-severitypath-traversalcwe-22
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 3 Sigma

Rowboat Labs Tool Exposed by Improper Authentication Vulnerability

CVE-2026-6635 — A security vulnerability has been detected in rowboatlabs rowboat up to 0.1.67. This impacts the function tool_call of the file apps/experimental/tools_webhook/app.py of the...

vulnerabilityCVEhigh-severitycwe-287
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6634 — The Function Memos_access_token Of The File Src/App.Tsx Of T Vulnerability

CVE-2026-6634 — A weakness has been identified in usememos memos up to 0.22.1. This affects the function memos_access_token of the file src/App.tsx of the component...

vulnerabilityCVEmedium-severitycwe-266cwe-285
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 2 Sigma