Description
A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects the function fromPptpUserAdd of the file /goform/PPTPDClient of the component httpd. Executing a manipulation of the argument opttype/usernamewith can lead to buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from a buffer overflow in the fromPptpUserAdd function of the httpd component on Tenda F456. Manipulating the opttype/username argument can overwrite memory and grant an attacker arbitrary code execution. This flaw is a classic stack-based overflow (CWE‑119), which can compromise confidentiality, integrity, and availability of the device and potentially the networks it connects.

Affected Systems

Tenda F456 1.0.0.5 is affected. Users running this firmware version should be aware that the buffer overflow can be triggered via remote HTTP requests to /goform/PPTPDClient.

Risk and Exploitability

The CVSS score of 8.7 reflects a high‑severity remote exploitation possibility. The EPSS score is below 1%, indicating a low current exploitation probability, and the vulnerability is not yet listed in the CISA KEV catalog. However, public exploit code is available, so the risk remains high. Attackers likely exploit the flaw by sending crafted requests to the device’s web interface, leveraging the buffer overflow to achieve remote code execution.

Generated by OpenCVE AI on April 28, 2026 at 05:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest firmware that contains the fix for the PPTPDClient buffer overflow.
  • If an update is unavailable, disable the PPTPDClient service or block HTTP access to /goform/PPTPDClient via firewall rules.
  • Restrict administrative access to the web interface to trusted internal networks only, and enforce strong authentication.

Generated by OpenCVE AI on April 28, 2026 at 05:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects the function fromPptpUserAdd of the file /goform/PPTPDClient of the component httpd. Executing a manipulation of the argument opttype/usernamewith can lead to buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda F456 httpd PPTPDClient fromPptpUserAdd buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:30:53.033Z

Reserved: 2026-04-26T01:02:42.651Z

Link: CVE-2026-7054

cve-icon Vulnrichment

Updated: 2026-04-27T13:11:01.289Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T22:17:32.580

Modified: 2026-04-29T22:28:40.570

Link: CVE-2026-7054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:15:22Z

Weaknesses