CVE-2026-7056
🟠 Łataj w tym tygodniu
Przepełnienie bufora w Tenda F456 umożliwia zdalne wykonanie kodu.
CVSS
8.8
EPSS
0.1%
Exploit
poc
Vendor
tenda
Opis źródłowy (NVD)
A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.
buffer-overflow exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-26 22:17:32 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 22:18:32 UTC |
Referencje
- https://github.com/Litengzheng/vuldb_new/blob/main/F456/vul_127/README.md (cna@vuldb.com) [Exploit, Third Party Advisory]
- https://vuldb.com/submit/798458 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/submit/798462 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359629 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359629/cti (cna@vuldb.com) [Permissions Required, VDB Entry]
- https://www.tenda.com.cn/ (cna@vuldb.com) [Product]