CVE-2026-7019
🟠 Łataj w tym tygodniu
Przepełnienie bufora w Tenda F456 umożliwia zdalne wykonanie kodu.
CVSS
8.8
EPSS
0.1%
Exploit
poc
Vendor
tenda
Opis źródłowy (NVD)
A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
buffer-overflow exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-26 05:16:01 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 18:44:24 UTC |
Referencje
- https://github.com/Litengzheng/vuldb_new/blob/main/F456/vul_118/README.md (cna@vuldb.com) [Exploit, Third Party Advisory]
- https://vuldb.com/submit/797473 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359598 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359598/cti (cna@vuldb.com) [Permissions Required, VDB Entry]
- https://www.tenda.com.cn/ (cna@vuldb.com) [Product]