Security Vulnerabilities
- CVEs Published In April 2026
Double free vulnerability in the multi-mode input system.
Impact: Successful exploitation of this vulnerability may affect availability.
Permission bypass vulnerability in the LBS module.
Impact: Successful exploitation of this vulnerability may affect availability.
UAF vulnerability in the communication module.
Impact: Successful exploitation of this vulnerability may affect availability.
Access control vulnerability in the memo module.
Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.
Race condition vulnerability in the event notification module.
Impact: Successful exploitation of this vulnerability may affect availability.
Stack overflow vulnerability in the media platform.
Impact: Successful exploitation of this vulnerability may affect availability.
Race condition vulnerability in the notification service.
Impact: Successful exploitation of this vulnerability may affect availability.
Vulnerability of improper permission control in the theme setting module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument wanmode/PPPOEPassword results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.