Platform
tenda
Component
tenda
Fixed in
1.0.1
CVE-2026-6121 describes a stack-based buffer overflow vulnerability present in the Tenda F451 router, specifically within the WrlclientSet function located in the /goform/WrlclientSet file. Successful exploitation allows a remote attacker to potentially compromise the device. This vulnerability affects versions 1.0.0 through 1.0.0.7, and an exploit is publicly available, increasing the risk of active exploitation. No official patch has been released at the time of publication.
A critical vulnerability has been identified in the Tenda F451 router, version 1.0.0.7, designated as CVE-2026-6121. This vulnerability, with a CVSS score of 8.8, poses a significant risk due to its potential for remote exploitation. The flaw resides within the 'WrlclientSet' function of the '/goform/WrlclientSet' file within the 'httpd' component. An attacker can manipulate the 'GO' argument to trigger a stack-based buffer overflow, potentially allowing for arbitrary code execution on the device. The publication of a functional exploit further exacerbates the situation, facilitating exploitation by malicious actors. The severity of this vulnerability demands immediate attention to prevent security compromises.
The CVE-2026-6121 vulnerability in the Tenda F451 is exploited through specific manipulation of the 'GO' argument in the 'WrlclientSet' function. An attacker can send a malicious HTTP request to the router, designed to overflow the stack buffer. The availability of a public exploit means attackers can easily replicate this attack. The router is vulnerable to remote attacks, meaning an attacker does not need physical access to the device. Successful exploitation could allow the attacker to gain control of the router, access sensitive data, or use the router as a springboard to attack other devices on the network. The lack of an official Tenda fix increases the risk of exploitation.
Exploit Status
EPSS
0.05% (15% percentile)
CISA SSVC
Currently, Tenda has not provided a firmware update to address this vulnerability (fix: none). The most effective mitigation is to replace the Tenda F451 router version 1.0.0.7 with a more secure and updated model. If replacement is not immediately feasible, isolating the affected router from the main network, restricting its access to the internet and other sensitive devices, is recommended. Monitoring the router for suspicious activity is crucial. Additionally, implementing strict firewall rules can help limit potential damage in the event of a successful exploitation. We strongly recommend contacting Tenda to request a security update and stay informed about any future developments.
Actualice el firmware de su dispositivo Tenda F451 a una versión corregida por el fabricante. Consulte el sitio web de soporte de Tenda o contacte con su servicio de atención al cliente para obtener más información sobre las actualizaciones disponibles.
Vulnerability analysis and critical alerts directly to your inbox.
It's a unique identifier for this security vulnerability.
No. Not updating leaves you vulnerable to attacks.
It's a programming error that allows an attacker to write data beyond the boundaries of a buffer, potentially executing malicious code.
Isolate the router from the main network and monitor its activity.
Currently, there is no solution available, but we recommend contacting Tenda for information.
CVSS Vector
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.