Description
A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Firmware Update
AI Analysis

Impact

A buffer overflow exists in the fromwebExcptypemanFilter function of the httpd component on the Tenda F456 router. Manipulation of the page argument in the /goform/webExcptypemanFilter endpoint can overflow the buffer, allowing an attacker to execute arbitrary code. This type of vulnerability is classified as a memory corruption flaw (CWE‑119/120) and, when successfully exploited, can lead to full compromise of the device, including data exfiltration, denial of service, or further network intrusion.

Affected Systems

The vulnerability affects the Tenda F456 model running firmware version 1.0.0.5. No other product versions are listed as impacted. The issue resides in the device’s web server, meaning any system exposing this interface could be targeted.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, while the EPSS score of less than 1 % shows a low probability of exploitation in the wild. The exploit is publicly available, yet the device is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker can remotely trigger the flaw by sending a crafted HTTP request to the /goform/webExcptypemanFilter endpoint when the web interface is reachable.

Generated by OpenCVE AI on April 28, 2026 at 19:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a version in which the buffer‑overflow bug in the httpd webExcptypemanFilter function has been repaired.
  • If an update is not immediately available, block or isolate the web management interface using a firewall or router‑side ACL so that only trusted local hosts can access it.
  • Continuously monitor network traffic and device logs for abnormal requests to /goform/webExcptypemanFilter and investigate any suspicious activity.

Generated by OpenCVE AI on April 28, 2026 at 19:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Wed, 29 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda F456 httpd webExcptypemanFilter fromwebExcptypemanFilter buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T13:48:26.761Z

Reserved: 2026-04-26T08:59:48.531Z

Link: CVE-2026-7097

cve-icon Vulnrichment

Updated: 2026-04-29T13:48:18.669Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T08:16:02.697

Modified: 2026-04-30T14:27:53.630

Link: CVE-2026-7097

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T20:00:19Z

Weaknesses