Description
A vulnerability was detected in Tenda F456 1.0.0.5. This impacts the function fromSafeMacFilter of the file /goform/SafeMacFilter. The manipulation of the argument page results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a buffer overflow in the fromSafeMacFilter function of the SafeMacFilter web form. This flaw occurs when the page argument is manipulated, allowing an attacker to overflow the buffer and potentially execute arbitrary code on the device. The overflow can compromise confidentiality, integrity, and availability. The weakness is a classic stack‑based buffer overflow, as indicated by CWE‑119 and CWE‑120.

Affected Systems

Affected devices are Tenda F456 routers running firmware version 1.0.0.5. No other versions are known to be affected from the published data. The vulnerability is located in the web management interface of the router.

Risk and Exploitability

The CVSS score of 8.7 denotes a high severity vulnerability. The EPSS score is below 1%, suggesting a low current exploitation probability, but the presence of a public exploit increases risk. The flaw can be reached remotely by sending a specially crafted request to the SafeMacFilter endpoint, so any device exposed to the Internet is a potential target. The vulnerability is not listed in the CISA KEV catalog, but its exploitability makes it relevant for immediate attention.

Generated by OpenCVE AI on April 28, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to Tenda F456 firmware 1.0.0.6 or later, where the SafeMacFilter buffer is fixed.
  • If an update is unavailable, block or restrict access to the /goform/SafeMacFilter endpoint from the WAN interface, limiting management to local network or VPN.
  • Disable the SafeMacFilter feature entirely if not required, or configure strict MAC address lists to reduce the attack surface.
  • Monitor router logs for suspicious attempts to the SafeMacFilter endpoint and apply network segmentation to isolate management traffic.

Generated by OpenCVE AI on April 28, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda F456 1.0.0.5. This impacts the function fromSafeMacFilter of the file /goform/SafeMacFilter. The manipulation of the argument page results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.
Title Tenda F456 SafeMacFilter fromSafeMacFilter buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:31:38.714Z

Reserved: 2026-04-25T14:20:51.894Z

Link: CVE-2026-7031

cve-icon Vulnrichment

Updated: 2026-04-27T13:10:58.775Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T10:16:02.687

Modified: 2026-04-29T18:29:13.710

Link: CVE-2026-7031

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:30:23Z

Weaknesses