Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2911: Buffer Overflow in Tenda FH451

0
High
VulnerabilityCVE-2026-2911cvecve-2026-2911
Published: Sun Feb 22 2026 (02/22/2026, 03:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: FH451

Description

CVE-2026-2911 is a high-severity buffer overflow vulnerability in Tenda FH451 routers up to firmware version 1. 0. 0. 9. The flaw exists in the processing of requests to the /goform/GstDhcpSetSer endpoint, allowing remote attackers to trigger a buffer overflow without authentication or user interaction. Exploitation can lead to complete compromise of the device, including remote code execution and denial of service. Although no known exploits are currently observed in the wild, public disclosure increases the risk of weaponization. The vulnerability affects all listed firmware versions and requires immediate attention from organizations using this router model. Due to the router’s deployment in various regions, the threat has global implications, especially in countries with significant Tenda market presence. Mitigation requires firmware updates once available or network-level protections to restrict access to the vulnerable endpoint.

AI-Powered Analysis

AILast updated: 02/22/2026, 20:50:01 UTC

Technical Analysis

CVE-2026-2911 is a critical buffer overflow vulnerability identified in the Tenda FH451 router series, specifically affecting firmware versions from 1.0.0.0 through 1.0.0.9. The vulnerability arises from improper handling of input data in the /goform/GstDhcpSetSer endpoint, which is part of the router's web management interface. An attacker can remotely send crafted HTTP requests to this endpoint, causing a buffer overflow condition. This flaw does not require authentication or user interaction, making it highly exploitable over the network. The buffer overflow can lead to memory corruption, enabling attackers to execute arbitrary code with elevated privileges or cause a denial of service by crashing the device. The CVSS v4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for privileges or user interaction. Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The absence of official patches at the time of disclosure necessitates immediate mitigation strategies to protect affected devices. Given the widespread use of Tenda routers in residential and small business environments, this vulnerability poses a significant risk to network security and device stability.

Potential Impact

The impact of CVE-2026-2911 is substantial for organizations and individuals using Tenda FH451 routers. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code remotely, potentially gaining control over the router’s functions. This can result in interception or manipulation of network traffic, disruption of internet connectivity, and use of the compromised device as a pivot point for further attacks within the network. Confidentiality is at risk as attackers may intercept sensitive data passing through the router. Integrity can be compromised if attackers alter configurations or inject malicious payloads. Availability is threatened due to potential denial of service conditions caused by crashes. For enterprises relying on these routers for critical connectivity, the vulnerability could lead to operational disruptions and data breaches. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of automated exploitation attempts. The public disclosure without an available patch further elevates the risk, necessitating urgent defensive measures.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface, especially the /goform/GstDhcpSetSer endpoint, by implementing network segmentation and firewall rules to allow only trusted IP addresses. 2. Disable remote management features if not required to reduce exposure. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the vulnerable endpoint to detect potential exploitation attempts. 4. Apply firmware updates from Tenda as soon as they become available to address the vulnerability directly. 5. If patches are not yet released, consider replacing affected devices with models not susceptible to this vulnerability in high-risk environments. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this specific vulnerability or exploit patterns. 7. Educate network administrators about the vulnerability and ensure incident response plans include steps for handling potential exploitation. 8. Regularly audit and update router configurations to minimize attack surface and ensure security best practices are followed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T20:16:11.075Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699b6bbfbe58cf853b9fec60

Added to database: 2/22/2026, 8:49:03 PM

Last enriched: 2/22/2026, 8:50:01 PM

Last updated: 2/23/2026, 8:13:44 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats