Description
A vulnerability has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function fromSafeClientFilter of the file /goform/SafeClientFilter. Such manipulation of the argument menufacturer/Go leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A remote attacker can trigger a buffer overflow in the fromSafeClientFilter function of the Tenda F456 router by sending a specially crafted value for the menufacturer/Go parameter. The overflow may overwrite memory or program control flow, leading to arbitrary code execution or denial of service on the affected device. The vulnerability belongs to the Memory Corruption class, specifically CWE-119 and CWE-120 error types. No additional privileges or physical access is required; the attack is launched over the network, making it accessible to attackers who can reach the router’s management interface.

Affected Systems

The vulnerability impacts the Tenda F456 router running firmware version 1.0.0.5. Users of this model and version are at risk. No other versions or models are listed as affected in the CNA data.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The exploitation path is straightforward: an attacker with network access to the router’s web interface can craft the malicious parameter and trigger the overflow. Because the affected code resides in the HTTP API, the threat is remote and does not require insider knowledge or privileged credentials.

Generated by OpenCVE AI on April 28, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest firmware update from Tenda that addresses the buffer overflow in the SafeClientFilter function
  • If an update is unavailable, block or restrict access to the /goform/SafeClientFilter endpoint using firewall rules or network segmentation
  • Consider disabling the SafeClientFilter feature if the router firmware permits, or remove the menufacturer/Go variable from any scripts or automated tools that interact with the router

Generated by OpenCVE AI on April 28, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Tue, 28 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Sun, 26 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function fromSafeClientFilter of the file /goform/SafeClientFilter. Such manipulation of the argument menufacturer/Go leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title Tenda F456 SafeClientFilter fromSafeClientFilter buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T16:55:09.044Z

Reserved: 2026-04-25T14:20:58.520Z

Link: CVE-2026-7033

cve-icon Vulnrichment

Updated: 2026-04-27T16:55:01.207Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T11:16:06.493

Modified: 2026-04-29T22:33:06.990

Link: CVE-2026-7033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:30:23Z

Weaknesses