Vulnerability Description
A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component httpd. The manipulation of the argument menufacturer/Go leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/Jimi-Lab/cve/issues/26
- https://vuldb.com/submit/792905
- https://vuldb.com/vuln/358266
- https://vuldb.com/vuln/358266/cti
- https://www.tenda.com.cn/
FAQ
What is CVE-2026-6632?
CVE-2026-6632 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component httpd. The manipulation...
How severe is CVE-2026-6632?
CVE-2026-6632 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6632?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.