Skip to content
CVSS 8.8 · HIGH

CVE-2026-7097

A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

View on NVD

Analysis

This is a vulnerability in the firmware of a Tenda F456 consumer router. It is vendor-specific hardware that is not commonly used in professional software development stacks, Linux server environments, or enterprise infrastructure. While the bug is a remote buffer overflow with a public exploit, the impact is limited to a specific consumer-grade device model.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-119CWE-120

EPSS

Probability of exploitation (next 30 days): 0.0009 (0.1%)
Percentile: 25.8%
EPSS: 2026-05-06

Affects

tenda:f456_firmwaretenda:f456

Technical description

A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

Published: 4/27/2026, 8:16:02 AM
Last modified: 4/30/2026, 2:27:53 PM

References

HomeEventsBlogResourcesTeam