<0.1% probability · 23.3th percentile — 2026-05-12
Affected versions
Tenda F456 1.0.0.5
Summary
This is a remotely exploitable buffer overflow vulnerability affecting Tenda F456 wireless routers. The flaw is located in the fromSafeClientFilter function of the web management interface, triggered by malicious input to the menufacturer or Go arguments. Attackers can exploit this to gain remote code execution on the affected device.
Remediation
No official vendor patch is available for this vulnerability. Restrict access to the web management interface to only trusted internal IP addresses. If the device cannot be updated, replace it with a supported router to mitigate ongoing risk.
Exploit info
This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.