Description
A weakness has been identified in Tenda F456 1.0.0.5. The impacted element is the function fromaddressNat of the file /goform/addressNat. Executing a manipulation of the argument menufacturer/Go can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch ASAP
AI Analysis

Impact

A buffer overflow flaw exists in the fromaddressNat handler of the Tenda F456 router, specifically the /goform/addressNat endpoint. By supplying a crafted menufacturer/Go argument, an attacker can overflow internal buffers, potentially overwriting return addresses and executing arbitrary code. The vulnerability is exploitable from outside the local network, allowing an attacker to compromise the router without local access.

Affected Systems

This defect affects the Tenda F456 model running firmware version 1.0.0.5. No other vendor or product variants are listed as vulnerable in the official CNA data.

Risk and Exploitability

The CVSS score of 8.7 indicates high impact, and the EPSS score of less than 1% suggests low likelihood of existing widespread exploitation at present; however, the flaw is publicly documented and a proof‑of‑concept is available. Because the vulnerability is remotely exploitable and can lead to arbitrary code execution, a successful attack would give an adversary full control over the device. The flaw is not yet listed in CISA’s KEV catalog, but its severity warrants immediate attention.

Generated by OpenCVE AI on April 28, 2026 at 05:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that removes the buffer overflow flaw.
  • If a firmware update is not immediately available, restrict remote access to the router’s web administration interface by configuring the router’s firewall or the network firewall to block inbound traffic to port 80/443 for the /goform/addressNat endpoint.
  • In environments where network segmentation is possible, keep the router’s management interface in a separate VLAN that is not reachable from untrusted networks, ensuring the vulnerable endpoint can only be accessed by trusted management hosts.

Generated by OpenCVE AI on April 28, 2026 at 05:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda F456 1.0.0.5. The impacted element is the function fromaddressNat of the file /goform/addressNat. Executing a manipulation of the argument menufacturer/Go can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Title Tenda F456 addressNat fromaddressNat buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T12:45:56.584Z

Reserved: 2026-04-25T14:20:44.606Z

Link: CVE-2026-7029

cve-icon Vulnrichment

Updated: 2026-04-27T12:45:52.327Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T09:16:19.290

Modified: 2026-04-30T14:03:15.573

Link: CVE-2026-7029

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:30:23Z

Weaknesses