CVE-2026-4534
Published: 22 March 2026
Summary
CVE-2026-4534 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Tenda Fh451 Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 mandates timely flaw remediation, directly addressing this known stack-based buffer overflow via firmware patching or updates.
SI-10 requires validation of information inputs like the GO argument to prevent stack buffer overflows from improper data handling.
SI-16 enforces memory protections such as stack guards and address space randomization to mitigate stack-based buffer overflow exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in router web form (/goform/WrlExtraSet) enables remote authenticated RCE (AV:N/PR:L) on a public-facing management interface, directly supporting T1190 for initial compromise and T1068 for escalation from low-privileged access to full code execution.
NVD Description
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and…
more
may be used.
Deeper analysisAI
CVE-2026-4534 is a stack-based buffer overflow vulnerability affecting Tenda FH451 router firmware version 1.0.0.9. The issue resides in the formWrlExtraSet function of the /goform/WrlExtraSet file, where manipulation of the GO argument triggers the overflow. Published on 2026-03-22, it is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).
The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating network accessibility, low attack complexity, and exploitation possible by low-privileged remote users without user interaction. Attackers can initiate the exploit remotely, potentially achieving high impacts on confidentiality, integrity, and availability, such as arbitrary code execution.
Advisories and references, including a GitHub repository at https://github.com/Litengzheng/vul_db/blob/main/FH451/vul_41/README.md containing a published exploit, VulDB entries at https://vuldb.com/?ctiid.352322, https://vuldb.com/?id.352322, and https://vuldb.com/?submit.774342, and the vendor site at https://www.tenda.com.cn/, provide further details. The exploit has been published and may be used, warranting immediate review of these sources for mitigation steps.
Details
- CWE(s)