Description
A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element is the function fromSetIpBind of the file /goform/SetIpBind of the component httpd. The manipulation of the argument page results in buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
Problem types
Product status
Timeline
| 2026-04-26: | Advisory disclosed |
| 2026-04-26: | VulDB entry created |
| 2026-04-26: | VulDB entry last update |
Credits
LtzHust (VulDB User)
References
vuldb.com/vuln/359653 (VDB-359653 | Tenda F456 httpd SetIpBind fromSetIpBind buffer overflow)
vuldb.com/vuln/359653/cti (VDB-359653 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/798460 (Submit #798460 | Tenda F456 v1.0.0.5 Stack-based Buffer Overflow)
github.com/...eng/vuldb_new/blob/main/F456/vul_129/README.md
www.tenda.com.cn/