Description
A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a buffer overflow in the HTTPD component of the Tenda F456 router. The fromSafeUrlFilter function in /goform/SafeUrlFilter improperly handles the page argument, allowing an attacker to overflow a buffer and potentially execute arbitrary code. It is identified as CWE‑119 (Improper Restriction of Operations within Bounds) and CWE‑120 (Buffer Overflow).

Affected Systems

Tenda F456 router, firmware version 1.0.0.5. No other versions or revisions are noted in the available data.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. The EPSS score of less than 1% suggests that, statistically, the probability of exploitation is low at this time, and the vulnerability is not listed in the CISA KEV catalog. The attack can be carried out remotely; it is inferred that the exploit involves crafting malicious input to the vulnerable endpoint. Given that the exploit has been published, an attacker with network access to the device could trigger the overflow and execute code without further authentication. Its impact on confidentiality, integrity, and availability is significant, with the potential to compromise the entire device.

Generated by OpenCVE AI on April 28, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for the Tenda F456 that addresses the buffer overflow in the SafeUrlFilter interface.
  • Configure the router’s firewall or network segmentation to block external traffic to the web management ports (80/443) and limit access to trusted internal networks.
  • Change the default administrative credentials and disable any unused management services to reduce the attack surface.

Generated by OpenCVE AI on April 28, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.
Title Tenda F456 httpd SafeUrlFilter fromSafeUrlFilter buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T16:40:48.988Z

Reserved: 2026-04-26T01:02:48.996Z

Link: CVE-2026-7056

cve-icon Vulnrichment

Updated: 2026-04-27T16:40:44.330Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T22:17:32.917

Modified: 2026-04-29T22:18:32.120

Link: CVE-2026-7056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:30:32Z

Weaknesses