Description
A security vulnerability has been detected in Tenda F456 1.0.0.5. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component httpd. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a buffer overflow in the fromVirtualSer function of the httpd component, triggered by manipulating the menufacturer/Go argument in /goform/VirtualSer. A remote attacker can supply a crafted payload that overflows internal buffers, potentially leading to arbitrary code execution on the device. The flaw maps to CWE-119 and CWE-120 and carries a CVSS score of 8.7, indicating a high severity. The description explicitly states that the exploit is possible remotely and has been publicly disclosed, underlining the likelihood of exploitation once accessed.

Affected Systems

The affected system is the Tenda F456 router, specifically firmware version 1.0.0.5. No additional platforms or versions are listed, so the issue is limited to this firmware revision. Users of later or earlier firmware versions are not reported as affected.

Risk and Exploitability

The EPSS score is reported as less than 1%, suggesting a low probability of exploitation in the wild, yet the vulnerability’s high CVSS score and remote nature mean that a determined attacker could still target the device if it is exposed on a network. The vulnerability is not catalogued in the CISA KEV list, but the publicly disclosed exploit code indicates that remote attackers could attempt to trigger the overflow via HTTP requests to the device’s /goform/VirtualSer endpoint.

Generated by OpenCVE AI on April 28, 2026 at 05:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that removes the vulnerable fromVirtualSer implementation, as available from Tenda’s official support site.
  • If a firmware update is not immediately available, block or filter traffic to the /goform/VirtualSer endpoint using the device’s firewall or an external ACL to prevent remote access to that function.
  • Continuously monitor network traffic logs for unusual requests targeting /goform/VirtualSer and apply the latest security patches when released.

Generated by OpenCVE AI on April 28, 2026 at 05:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda F456 1.0.0.5. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component httpd. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Title Tenda F456 httpd VirtualSer fromVirtualSer buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:39:01.834Z

Reserved: 2026-04-26T01:02:45.861Z

Link: CVE-2026-7055

cve-icon Vulnrichment

Updated: 2026-04-27T13:38:52.252Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T22:17:32.750

Modified: 2026-04-29T22:24:06.893

Link: CVE-2026-7055

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:15:22Z

Weaknesses