Description
A security flaw has been discovered in Tenda F456 1.0.0.5. This affects the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Performing a manipulation of the argument page results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

A buffer overflow flaw is present in the frmL7ProtForm handler of the /goform/L7Prot endpoint in the httpd component of Tenda F456 firmware 1.0.0.5. The vulnerability is triggered when a specially crafted message is sent to the "page" argument, causing an uncontrolled write beyond the bounds of the buffer in memory. The overflow can lead to execution of arbitrary code on the device, giving a remote attacker control of the router.

Affected Systems

The flaw affects the Tenda F456 router running firmware version 1.0.0.5. No other version numbers are specified in the data, so only this configuration is confirmed to be vulnerable.

Risk and Exploitability

The flaw scores a high CVSS of 8.7, indicating serious impact. The EPSS indicates an exploitation probability of less than 1 percent, and the vulnerability is not listed in the CISA KEV catalog. Remote exploitation can be achieved via HTTP requests to the affected endpoint, and the public release of an exploit demonstrates that attackers could mount successful attacks if the router is exposed to the Internet.

Generated by OpenCVE AI on April 28, 2026 at 05:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router to the latest firmware released by Tenda that contains the fix for the L7Prot buffer overflow.
  • Configure the firewall or router settings to block or restrict remote access to the web management interface from the WAN side.
  • If the router provides an option to disable the L7Prot feature, turn it off or limit its availability to local addresses only.
  • Monitor inbound traffic for abnormal requests to the /goform/L7Prot endpoint and block source addresses that appear suspicious.

Generated by OpenCVE AI on April 28, 2026 at 05:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda F456 1.0.0.5. This affects the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Performing a manipulation of the argument page results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Title Tenda F456 httpd L7Prot frmL7ProtForm buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:05:11.077Z

Reserved: 2026-04-26T01:02:38.354Z

Link: CVE-2026-7053

cve-icon Vulnrichment

Updated: 2026-04-27T13:05:07.795Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T22:17:32.413

Modified: 2026-04-29T22:29:32.883

Link: CVE-2026-7053

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:15:22Z

Weaknesses