Description
A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the fromP2pListFilter function of the /goform/P2pListFilter endpoint on Tenda F456 routers. Manipulating the "menufacturer/Go" argument causes a buffer overflow, which can be triggered remotely via the router's web interface. Attackers who exploit the overflow can execute arbitrary code on the device, potentially leading to full control over the router and the networks it manages. Publicly available exploits indicate that the weakness is readily usable by threat actors.

Affected Systems

Vendors and products: Tenda routers model F456, specifically firmware version 1.0.0.5. No other versions or models are listed as affected in the available data.

Risk and Exploitability

The CVSS score of 8.7 denotes high severity, while the EPSS score of less than 1% suggests a low probability of exploitation at a given moment, though the existence of public exploits means the risk remains non‑negligible. The vulnerability is not listed in CISA's KEV catalog. Exploitation requires remote access to the router’s management interface, typically over the local network or via a compromised router configuration portal. Attackers must supply a crafted request with an oversized "menufacturer/Go" parameter to trigger the overflow.

Generated by OpenCVE AI on April 28, 2026 at 05:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest version that addresses the buffer overflow in the fromP2pListFilter function.
  • If an updated firmware is unavailable, patch the firmware using the vendor’s official security patch or apply a custom firmware fix that corrects the argument size validation.
  • As a temporary workaround, disable the P2P feature or block access to the /goform/P2pListFilter URL through the router’s firewall or web interface settings to prevent the overflow from being triggered.

Generated by OpenCVE AI on April 28, 2026 at 05:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Title Tenda F456 P2pListFilter fromP2pListFilter buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T12:43:05.224Z

Reserved: 2026-04-25T11:24:16.138Z

Link: CVE-2026-7019

cve-icon Vulnrichment

Updated: 2026-04-27T12:43:00.905Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T05:16:01.330

Modified: 2026-04-29T18:44:24.620

Link: CVE-2026-7019

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:30:23Z

Weaknesses