Platform
tenda
Component
tenda
Fixed in
1.0.1
A critical buffer overflow vulnerability (CVE-2026-6133) has been discovered in the Tenda F451 SafeUrlFilter, specifically affecting versions between 1.0.0 and 1.0.0.7cnsvn7958. This flaw resides within the /goform/SafeUrlFilter function and allows remote attackers to trigger a stack-based buffer overflow by manipulating the 'page' argument. A public exploit is already available, increasing the risk of immediate exploitation.
The vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F451 router. By crafting a malicious request targeting the /goform/SafeUrlFilter endpoint, an attacker can overwrite memory on the stack, potentially gaining control of the device. Successful exploitation could lead to complete system compromise, including data theft, configuration modification, and the use of the router as a pivot point for further attacks within the network. The availability of a public exploit significantly elevates the risk, making it a high-priority concern.
CVE-2026-6133 is publicly known and a proof-of-concept exploit is available, indicating a high probability of exploitation. The vulnerability was disclosed on 2026-04-12. It is not currently listed on CISA KEV, but its public availability warrants close monitoring. Given the ease of exploitation, organizations using the affected Tenda F451 models should prioritize remediation.
Exploit Status
EPSS
0.05% (15% percentile)
CISA SSVC
The primary mitigation is to upgrade the Tenda F451 firmware to a patched version. Unfortunately, a fixed version is not yet specified in the CVE details. As a temporary workaround, consider implementing strict input validation on the 'page' parameter within the /goform/SafeUrlFilter endpoint, if possible. Network segmentation can limit the potential blast radius of a successful exploit. Monitor router logs for unusual activity or attempts to access the /goform/SafeUrlFilter endpoint. A WAF configured to detect buffer overflow attempts targeting this endpoint could also provide some protection.
Update the firmware of your Tenda F451 device to a patched version to mitigate the risk of buffer overflow. Refer to the official Tenda website or support channels for the latest firmware version.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-6133 is a HIGH severity buffer overflow vulnerability in the Tenda F451 SafeUrlFilter, allowing remote attackers to potentially gain control of the router.
You are affected if you are using a Tenda F451 router running versions 1.0.0–1.0.0.7cnsvn7958.
Upgrade to a patched firmware version. As of this writing, a fixed version is not yet available; monitor Tenda's website for updates.
Yes, a public proof-of-concept exploit is available, indicating a high probability of active exploitation.
Check the Tenda support website for advisories related to CVE-2026-6133: https://www.tenda.com/support
CVSS Vector
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.