Vulnerability Summary: Tenda F451 Buffer Overflow Vulnerability Overview Vulnerability Name: Tenda F451 1.0.0.7_cn_svn7958 httpd /goform/SafeClientFilter fromSafeClientFilter manufacturer/Go buffer overflow CVE ID: CVE-2026-6632 CVSS Score: 8.0 (Critical) Vulnerability Type: Buffer Overflow CWE Classification: CWE-120, CWE-119 Affected Component: function in the component Trigger Condition: Manipulating the parameter; input data is copied directly to the output buffer without validation, leading to buffer overflow. Attack Vector: Remote Exploitation Difficulty: Easy Current Status: Publicly available exploit code (Proof-of-Concept) Impact Scope Vendor: Tenda Product: F451 Version: 1.0.0.7_cn_svn7958 Operating System: Router Operating System Remediation Official Recommendation: Page displays "no mitigation known" (no known mitigation measures at this time). Suggested Measures: Replace affected devices with alternative products. Exploit Code (POC) The page does not contain specific code blocks, only provides a link to the Proof-of-Concept on GitHub: POC Link: github.com (specific link can be obtained by clicking "exploit is shared for download at github.com" on the page)