Tenda Router Vulnerability Exposes Networks to Remote Exploitation
The National Vulnerability Database has identified CVE-2026-6632, a critical buffer overflow vulnerability in Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. The flaw resides in the httpd component’s /goform/SafeClientFilter function, allowing remote attackers to exploit it by manipulating the menufacturer/Go argument. This grants attackers the ability to trigger a buffer overflow, potentially leading to a full compromise of the affected device.
With a CVSS score of 8.8 (HIGH) and a publicly available exploit, this vulnerability presents a significant risk to users. The ease of remote exploitation and the lack of specific affected product details beyond the firmware version mean that any organization utilizing these routers should consider them at immediate risk. Defenders must prioritize identifying and securing these devices within their networks.
What This Means For You
- If your organization uses Tenda F451 routers, immediately audit your network for devices running firmware version 1.0.0.7_cn_svn7958. Isolate or disable any identified devices and prioritize patching or replacement. Given the publicly available exploit, assume these devices are actively targeted.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-6632 Tenda Router SafeClientFilter Buffer Overflow
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6632 | Vulnerability | CVE-2026-6632 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 20, 2026 at 14:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.