CVE-2026-7097
🟠 Łataj w tym tygodniu
Przepełnienie bufora w Tenda F456 umożliwia zdalne wykonanie kodu.
CVSS
8.8
EPSS
0.1%
Exploit
poc
Vendor
tenda
Opis źródłowy (NVD)
A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
buffer-overflow exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-27 08:16:02 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-30 14:27:53 UTC |
Referencje
- https://github.com/Litengzheng/vuldb_new/blob/main/F456/vul_135/README.md (cna@vuldb.com) [Exploit, Third Party Advisory]
- https://vuldb.com/submit/798470 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359672 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359672/cti (cna@vuldb.com) [Permissions Required, VDB Entry]
- https://www.tenda.com.cn/ (cna@vuldb.com) [Product]