Description
A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the function formQuickIndex of the file /goform/QuickIndex of the component httpd. Performing a manipulation of the argument mit_linktype results in buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Published: 2026-04-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerable component is the formQuickIndex function in the httpd module of the Tenda F456 router. By manipulating the mit_linktype parameter, an attacker can trigger a buffer overflow, potentially allowing execution of arbitrary code on the device. This can compromise the confidentiality, integrity, and availability of the router and the network it serves.

Affected Systems

Affected hardware is the Tenda F456 router running firmware version 1.0.0.5. The vulnerability is exposed through the router’s web interface at the /goform/QuickIndex endpoint, and can be accessed by clients on the network or externally if the interface is reachable.

Risk and Exploitability

The CVSS score of 8.7 classifies this flaw as high severity. Although its EPSS score is below 1%, the vulnerability is already publicly exploited and can be triggered remotely via HTTP requests, with no authentication required. The lack of inclusion in the CISA KEV catalog does not mitigate the risk; active exploitation remains possible for any device running the vulnerable firmware.

Generated by OpenCVE AI on April 28, 2026 at 04:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that addresses the QuickIndex buffer overflow.
  • If an update is not immediately available, disable the QuickIndex feature in the router’s web interface or configuration to block access to /goform/QuickIndex.
  • If disabling is not possible, restrict external access to the router’s web interface using firewall rules or network segmentation to prevent tampering with the vulnerable endpoint.

Generated by OpenCVE AI on April 28, 2026 at 04:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f456 Firmware
CPEs cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:*
Vendors & Products Tenda f456 Firmware

Tue, 28 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f456
Vendors & Products Tenda
Tenda f456

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the function formQuickIndex of the file /goform/QuickIndex of the component httpd. Performing a manipulation of the argument mit_linktype results in buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Title Tenda F456 httpd QuickIndex formQuickIndex buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F456 F456 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:29:18.108Z

Reserved: 2026-04-26T08:59:54.988Z

Link: CVE-2026-7099

cve-icon Vulnrichment

Updated: 2026-04-27T13:11:08.404Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T09:16:02.380

Modified: 2026-04-30T14:04:00.633

Link: CVE-2026-7099

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:45:22Z

Weaknesses