Description
A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. Such manipulation of the argument delno leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

A buffer overflow occurs in the fromPPTPUserSetting function of the httpd component, triggered by manipulating the delno argument via the /goform/PPTPUserSetting interface. The overflow can corrupt memory, potentially allowing an attacker to execute arbitrary code on the device. The vulnerability is documented as exploitable remotely, meaning an attacker need only send a crafted request over the network to trigger the overflow and elevate their privileges to that of the device’s firmware code.

Affected Systems

The flaw affects Tenda F456 routers running firmware version 1.0.0.5. No other Tenda or vendor versions were identified as vulnerable in the available data.

Risk and Exploitability

The CVSS score of 8.7 classifies the issue as high severity, and while the EPSS score is below 1%, indicating a low probability of widespread exploitation at present, it is not zero and could be targeted by threat actors with interest in the compromised platform. The vulnerability is not listed in the CISA KEV catalog, but the remote nature of the attack vector and lack of mitigations could still pose significant risk if the device is exposed to untrusted networks.

Generated by OpenCVE AI on April 28, 2026 at 04:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest Tenda F456 release that includes the buffer‑overflow fix.
  • Limit or block access to the /goform/PPTPUserSetting endpoint by configuring host‑based firewall rules or ACLs so that only trusted management addresses can reach it.
  • If PPTP VPN functionality is not required, disable the PPTP service or remove the feature from the device’s web interface.

Generated by OpenCVE AI on April 28, 2026 at 04:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. Such manipulation of the argument delno leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Title Tenda F456 httpd PPTPUserSetting fromPPTPUserSetting buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:22:21.176Z

Reserved: 2026-04-26T07:59:55.906Z

Link: CVE-2026-7080

cve-icon Vulnrichment

Updated: 2026-04-27T13:22:14.673Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T03:16:00.127

Modified: 2026-04-30T14:35:53.963

Link: CVE-2026-7080

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:00:14Z

Weaknesses