Vulnerability Description
A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | F456 Firmware | 1.0.0.5 |
| Tenda | F456 | - |
Related Weaknesses (CWE)
References
- https://github.com/Litengzheng/vuldb_new/blob/main/F456/vul_135/README.mdExploitThird Party Advisory
- https://vuldb.com/submit/798470Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/359672Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/359672/ctiPermissions RequiredVDB Entry
- https://www.tenda.com.cn/Product
FAQ
What is CVE-2026-7097?
CVE-2026-7097 is a vulnerability with a CVSS score of 8.8 (HIGH). A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the...
How severe is CVE-2026-7097?
CVE-2026-7097 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7097?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda F456 Firmware, Tenda F456.