Description
A weakness has been identified in Tenda F456 1.0.0.5. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. This manipulation of the argument wanmode causes buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Patch ASAP
AI Analysis

Impact

The vulnerability resides in the httpd component of the Tenda F456 router, specifically the fromAdvSetWan function exposed via /goform/AdvSetWan. By manipulating the wanmode argument an attacker can trigger a buffer overflow, potentially enabling arbitrary code execution or denial of service. The weakness is identified by CWE‑119 and CWE‑120 and represents a serious integrity compromise if successful.

Affected Systems

Products affected are the Tenda F456 router running firmware version 1.0.0.5. No other affected firmware or products are listed.

Risk and Exploitability

This flaw has a CVSS score of 8.7, indicating high severity. The EPSS score is reported as less than 1%, suggesting a very low probability of exploitation at the time of analysis, but the exploit has been made publicly available, so the risk is non‑negligible. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is remote, via an HTTP request to the vulnerable endpoint. An attacker with network access to the device’s web interface could craft a payload that abuses the buffer overflow to gain unauthorized control.

Generated by OpenCVE AI on April 28, 2026 at 04:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that fixes the AdvSetWan buffer overflow or any vendor‑supplied security patch.
  • Implement network segmentation or firewall rules to restrict access to the router’s web management interface, limiting exposure to trusted local networks.
  • Monitor traffic to the /goform/AdvSetWan endpoint for abnormal request patterns and log any suspicious activity for further investigation.

Generated by OpenCVE AI on April 28, 2026 at 04:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda F456 1.0.0.5. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. This manipulation of the argument wanmode causes buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda F456 httpd AdvSetWan fromAdvSetWan buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:30:13.939Z

Reserved: 2026-04-26T07:59:50.307Z

Link: CVE-2026-7079

cve-icon Vulnrichment

Updated: 2026-04-27T13:11:06.314Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T03:15:59.950

Modified: 2026-04-30T14:37:06.803

Link: CVE-2026-7079

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:00:14Z

Weaknesses