TopVuln

High-risk vulnerability digests

CVE-2026-7078

  • HIGH

Tenda F456 httpd SetIpBind fromSetIpBind buffer overflow

Details

CVSS v3
8.8
CVSS v4
7.4
CVSS v2
9.0
NVD published
2026-04-27 03:15:59
EPSS
<0.1% probability · 23.3th percentile — 2026-05-12
Affected versions
Tenda F456 1.0.0.5
Summary
This is a buffer overflow vulnerability in the httpd management service of widely deployed Tenda F456 consumer routers. The flaw exists in the fromSetIpBind function handling requests to the /goform/SetIpBind endpoint. Attackers can exploit this vulnerability remotely to execute arbitrary code or trigger a denial of service on the affected device.
Remediation
Check for official firmware updates from Tenda and apply any available security patches immediately. If no patch is available, restrict access to the httpd management interface to only trusted IP addresses. Disable remote management functionality if it is not required.
Exploit info
This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.