Tenda Router Vulnerability Exposes Networks to Remote Exploitation

Tenda Router Vulnerability Exposes Networks to Remote Exploitation

The National Vulnerability Database has identified CVE-2026-6632, a critical buffer overflow vulnerability in Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. The flaw resides in the httpd component’s /goform/SafeClientFilter function, allowing remote attackers to exploit it by manipulating the menufacturer/Go argument. This grants attackers the ability to trigger a buffer overflow, potentially leading to a full compromise of the affected device.

With a CVSS score of 8.8 (HIGH) and a publicly available exploit, this vulnerability presents a significant risk to users. The ease of remote exploitation and the lack of specific affected product details beyond the firmware version mean that any organization utilizing these routers should consider them at immediate risk. Defenders must prioritize identifying and securing these devices within their networks.

What This Means For You

  • If your organization uses Tenda F451 routers, immediately audit your network for devices running firmware version 1.0.0.7_cn_svn7958. Isolate or disable any identified devices and prioritize patching or replacement. Given the publicly available exploit, assume these devices are actively targeted.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-6632 Tenda Router SafeClientFilter Buffer Overflow

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6632 Vulnerability CVE-2026-6632
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 20, 2026 at 14:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6636 — P2r3 Convert Path Traversal

CVE-2026-6636 — A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423612a5cf91de75b. Affected is the function Bun.serve of the file buildCache.js of the component API....

vulnerabilityCVEmedium-severitypath-traversalcwe-22
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 3 Sigma

Rowboat Labs Tool Exposed by Improper Authentication Vulnerability

CVE-2026-6635 — A security vulnerability has been detected in rowboatlabs rowboat up to 0.1.67. This impacts the function tool_call of the file apps/experimental/tools_webhook/app.py of the...

vulnerabilityCVEhigh-severitycwe-287
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6634 — The Function Memos_access_token Of The File Src/App.Tsx Of T Vulnerability

CVE-2026-6634 — A weakness has been identified in usememos memos up to 0.22.1. This affects the function memos_access_token of the file src/App.tsx of the component...

vulnerabilityCVEmedium-severitycwe-266cwe-285
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 2 Sigma