Description
A security vulnerability has been detected in Tenda F456 1.0.0.5. This affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

The flaw is a classic buffer overflow triggered in the fromRouteStatic routine located in the /goform/RouteStatic web service of Tenda F456 routers. By supplying an oversized argument to the page parameter, an attacker can corrupt stack memory and potentially execute arbitrary code on the device. The vulnerability directly impacts confidentiality, integrity and availability of the router and all devices on the network it serves. It is a type‑I and overrun flaw as classified under CWE‑119 and CWE‑120.

Affected Systems

Tenda F456 routers running firmware version 1.0.0.5 are vulnerable. No other firmware revisions or product variants are listed as affected; however, any device identified as "Tenda F456" with this exact firmware build should be considered at risk.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. The EPSS score of less than 1% suggests the flaw has not been widely exploited yet, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, requiring access to the router’s web interface. An attacker must be able to send malicious HTTP requests that include the crafted page parameter; no local privilege escalation is required. Once successful, the attacker can gain full control of the router and potentially pivot to other network assets.

Generated by OpenCVE AI on April 28, 2026 at 05:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router to the latest firmware released by Tenda that removes the buffer overflow in the fromRouteStatic function.
  • If a firmware patch is unavailable, limit access to the router’s web management interface to trusted IP addresses or a VPN tunnel, and block HTTP traffic to the /goform/RouteStatic endpoint from untrusted networks.
  • Configure firewall or routing rules to monitor and deny repeated attempts to hit /goform/RouteStatic with suspicious payloads, and consider disabling the RouteStatic feature if it is not required for your network configuration.

Generated by OpenCVE AI on April 28, 2026 at 05:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda F456 1.0.0.5. This affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Title Tenda F456 RouteStatic fromRouteStatic buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:11:30.234Z

Reserved: 2026-04-25T14:20:48.532Z

Link: CVE-2026-7030

cve-icon Vulnrichment

Updated: 2026-04-27T13:11:27.217Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T10:16:01.247

Modified: 2026-04-30T14:03:34.917

Link: CVE-2026-7030

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:30:23Z

Weaknesses