Description
A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element is the function fromSetIpBind of the file /goform/SetIpBind of the component httpd. The manipulation of the argument page results in buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess
AI Analysis

Impact

A buffer overflow flaw exists in the httpd component of Tenda F456 firmware 1.0.0.5. The vulnerability is triggered by manipulating the "page" argument in the fromSetIpBind function that can be accessed remotely through the /goform/SetIpBind endpoint. The overflow may allow an attacker to corrupt memory and potentially execute arbitrary code on the device, which is why the flaw is classified under CWE‑119 and CWE‑120.

Affected Systems

The affected system is the Tenda F456 router operating on firmware version 1.0.0.5. No other Tenda models or firmware releases are listed as impacted.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, while the EPSS score of less than 1% suggests a low probability of exploitation at the time of this assessment. The vulnerability is not listed in CISA’s KEV catalog. An attacker can launch the exploit remotely by sending a specially crafted request to the vulnerable httpd endpoint; public exploit code has already been released.

Generated by OpenCVE AI on April 28, 2026 at 13:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict or disable the /goform/SetIpBind endpoint so that only trusted IP addresses can access the web management interface.
  • Apply any firmware update from Tenda that addresses this buffer overflow; if none is currently available, monitor Tenda’s website or vendor resources for a future fix.
  • Use network segmentation and firewall rules to isolate the router from untrusted external networks, thereby reducing exposure to the vulnerable endpoint.

Generated by OpenCVE AI on April 28, 2026 at 13:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element is the function fromSetIpBind of the file /goform/SetIpBind of the component httpd. The manipulation of the argument page results in buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
Title Tenda F456 httpd SetIpBind fromSetIpBind buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:00:02.527Z

Reserved: 2026-04-26T07:59:46.474Z

Link: CVE-2026-7078

cve-icon Vulnrichment

Updated: 2026-04-27T12:59:58.785Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T03:15:59.780

Modified: 2026-04-30T14:38:22.990

Link: CVE-2026-7078

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:15:31Z

Weaknesses