Description
A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Executing a manipulation of the argument Go can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
Published: 2026-04-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via buffer overflow
Action: Patch ASAP
AI Analysis

Impact

The vulnerability is a buffer overflow in the formWrlExtraSet function of the /goform/WrlExtraSet HTTP endpoint in Tenda F456 firmware 1.0.0.5. It is triggered by a crafted value sent in the Go argument, and the missing bounds check allows memory corruption that can lead to arbitrary code execution once the request reaches the device. The weakness is classified as CWE‑119 and CWE‑120, indicating improper buffer bounds checking and uncontrolled buffer usage. Based on the description, it is inferred that an attacker who can reach the device’s web interface can manipulate input to achieve code execution, potentially allowing full control of the router.

Affected Systems

Tenda F456 routers running firmware version 1.0.0.5 are affected. The issue is limited to this model’s httpd implementation; newer firmware releases are presumed to have incorporated the fix. Based on the description, it is inferred that operators with devices exposed to external networks or untrusted traffic are particularly at risk.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. The EPSS score is below 1%, but the CVE notes that an exploit has already been published, suggesting real-world usage may be higher than the EPSS statistic implies. The vulnerability is not listed in the CISA KEV catalog, but the availability of a published exploit and the ability to reach the vulnerable endpoint over HTTP make the attack likely in environments where the device is exposed. Based on the description, the attack vector is remote through the web management interface, requiring network connectivity to the router and the ability to send HTTP POST requests to /goform/WrlExtraSet.

Generated by OpenCVE AI on April 28, 2026 at 19:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for the Tenda F456 that includes a fixed httpd component.
  • Limit access to the router’s web management interface to trusted IP ranges or place the device on a secure VLAN by enforcing firewall rules.
  • If no update is available, disable or block the /goform/WrlExtraSet endpoint to stop the vulnerable function from being reachable by external clients.
  • Monitor the router and the surrounding network for signs of exploitation attempts, such as unexpected traffic or abnormal processes.

Generated by OpenCVE AI on April 28, 2026 at 19:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Wed, 29 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Executing a manipulation of the argument Go can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
Title Tenda F456 httpd WrlExtraSet formWrlExtraSet buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T13:45:44.220Z

Reserved: 2026-04-26T08:00:23.195Z

Link: CVE-2026-7082

cve-icon Vulnrichment

Updated: 2026-04-29T13:45:39.197Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T04:16:09.523

Modified: 2026-04-30T14:28:51.153

Link: CVE-2026-7082

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T20:00:19Z

Weaknesses