Skip to content
CVSS 8.8 · HIGH

CVE-2026-7081

A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

Ver en NVD

Análisis

This is a buffer overflow in a specific Tenda consumer router (F456). While it is a remote code execution vulnerability with a public exploit, it concerns low-end consumer hardware that is not part of the professional software development or infrastructure stack. It is vendor-specific firmware with limited relevance to the community.

Severidad

Puntaje: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0008 (0.1%)
Percentil: 23.2%
EPSS: 2026-05-06

Afecta

tenda:f456_firmwaretenda:f456

Descripción técnica

A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

Publicada: 27/4/2026, 4:16:09
Última modificación: 30/4/2026, 14:30:56

Referencias

InicioEventosBlogRecursosEquipo