A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/Litengzheng/vuldb_new/blob/main/F456/vul_127/README.md | Exploit Third Party Advisory |
| https://vuldb.com/submit/798458 | Third Party Advisory VDB Entry |
| https://vuldb.com/submit/798462 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/359629 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/359629/cti | Permissions Required VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
29 Apr 2026, 22:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:tenda:f456_firmware:1.0.0.5:*:*:*:*:*:*:* cpe:2.3:h:tenda:f456:-:*:*:*:*:*:*:* |
|
| First Time |
Tenda
Tenda f456 Tenda f456 Firmware |
|
| References | () https://github.com/Litengzheng/vuldb_new/blob/main/F456/vul_127/README.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/798458 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/submit/798462 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/359629 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/359629/cti - Permissions Required, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product |
26 Apr 2026, 22:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-26 22:17
Updated : 2026-04-29 22:18
NVD link : CVE-2026-7056
Mitre link : CVE-2026-7056
CVE.ORG link : CVE-2026-7056
JSON object : View
Products Affected
tenda
- f456_firmware
- f456
